The FFIEC’s Architecture, Infrastructure, and Operations book

The FFIEC’s Architecture, Infrastructure, and Operations book

The Federal Financial Institutions Evaluation Council (FFIEC) is a governmental body that provides interagency regulatory guidance for financial institutions. This provides a consistent framework for different regulatory bodies, and applies to the OCC, Federal Reserve, CSRB, and others. In June 2021, following large cyber attacks on the United States and the resulting Executive order on Cyber security, the FFIEC released the largest update in guidance in over a decade to help financial auditors assess financial…

Read More

Catching the Next Wave of Innovation in Routing and Automation

Catching the Next Wave of Innovation in Routing and Automation

The ocean has plenty of waves but catching the perfect one requires serious thought and planning since we know water is never predictable. Surfers need to time it right with precision and use a balance of strength and endurance to paddle, pop up, and ride the wave without wiping out. Having the skills and the right board makes all the difference for an ultimate surfing experience. At Cisco, we’ve been catching many waves over the…

Read More

Top 5 trends to watch in cloud security

Top 5 trends to watch in cloud security

Cloud security solutions continue to emerge as threats to cloud resources evolve. However, what are the common trends to look out for in cloud security in the coming years? Let’s find out. Image: natali_mis/Adobe Stock The evolution of cloud computing technology has enabled many businesses to improve their competitive agility and reduce the cost of operations. Today, many business organizations have completed the migration of their computing resources to the cloud, while several others are…

Read More

Bug Exploitation Now Top Ransomware Access Vector

Bug Exploitation Now Top Ransomware Access Vector

Vulnerability exploitation accounted for 52% of ransomware incidents investigated by Secureworks over the past 12 months, making it the number one initial access vector for threat actors, the vendor claimed in a new report. The security firm’s annual State of the Threat report is compiled from the insights of its Counter Threat Unit over the period. It found that exploitation of bugs in internet-facing systems was most favored by ransomware actors last year, rather than…

Read More

7 signs it’s time for a new CIO job

7 signs it’s time for a new CIO job

Parting may be a sweet sorrow, but it can be inevitable when a CIO detects a tell-tale sign that a quick and clean employment departure represents the best course of action. Most CIOs at one time or another have found themselves working at an enterprise that has seriously altered course, lost its focus, neglected competitiveness, or changed in some other significantly detrimental way. When that happens, it’s probably time to wave goodbye. How can a…

Read More

Used servers: Bargain or too good to be true?

Used servers: Bargain or too good to be true?

Enterprise IT teams are always on the lookout for ways to save money or gain operational efficiencies. One approach is to purchase used data center equipment such as servers, rather than investing in brand new systems and paying top dollar. There’s no shortage of resellers who cater to this market. Some equipment resellers specifically target gear from hyperscalers, because the hyperscalers replace their hardware at a fast pace, and the equipment they turnover can be…

Read More

Keep your business totally secure with this decentralized VPN

Keep your business totally secure with this decentralized VPN

The pocket-sized Deeper Connect Pico can help you tap into a worldwide security network. Image: StackCommerce When you are working with important data, security is paramount. The last thing you want is someone hacking your connections because you hooked up to hotel Wi-Fi. The Deeper Connect Pico is designed to put those fears to rest. This pocket-size device is small enough to take anywhere, and it provides VPN protection through a decentralized network. In our…

Read More

New Report from Proofpoint and Cybersecurity at MIT Sloan Reveals Almost Half of Board Members Globally Feel Unprepared for a Cyber Attack, Despite Viewing Cybersecurity as a High Priority | Proofpoint US

New Report from Proofpoint and Cybersecurity at MIT Sloan Reveals Almost Half of Board Members Globally Feel Unprepared for a Cyber Attack, Despite Viewing Cybersecurity as a High Priority | Proofpoint US

SUNNYVALE, Calif., October 4, 2022—Proofpoint, Inc., a leading cybersecurity and compliance company, and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, today released their Cybersecurity: The 2022 Board Perspective report, which explores board of directors’ perceptions about their key challenges and risks. Cybersecurity is dominant on their agendas. Seventy-seven percent of participants agree cybersecurity is a top priority for their board and 76% discuss the topic at least monthly. Consequently, 75% believe their boards clearly…

Read More

NCMS CIO exploits ‘Great Resignation’ to slash costs, streamline IT operations

NCMS CIO exploits ‘Great Resignation’ to slash costs, streamline IT operations

The end of the Great Resignation — the latest buzzword referring to a record number of people quitting their jobs since the pandemic — seems to be nowhere in sight. “New employee expectations, and the availability of hybrid arrangements, will continue to fuel the rise in attrition. An individual organization with a turnover rate of 20% before the pandemic could face a turnover rate as high as 24% in 2022 and the years to come,”…

Read More

How to build more secure APIs

How to build more secure APIs

How to build more secure APIs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2,735 2,736 2,737 2,738 2,739 4,178