Protecting Your Supply Chain with Data-Aware Security

Protecting Your Supply Chain with Data-Aware Security

In a previous article, we talked about the need for organizations to secure data wherever it resides. The complexity of today’s supply chains brings that need into sharp focus, while highlighting some of the challenges of successfully protecting data. Many organizations today depend on a complex web of partners, vendors, and suppliers to run their business. As the size and complexity of the digital supply chain grows, so does an organization’s vulnerability. One need only…

Read More

Scaling One Peak After Another

Scaling One Peak After Another

Cloudera has appointed Remus Lim as vice president of Asia Pacific and Japan, to drive adoption of the hybrid data platform across the region and support customers in their journey to become more data-driven. We’ve asked him to share his vision for Cloudera in APAC and reflect on his past few months since taking up the mantle. What drew you to the tech space and attracted you to the roles you’ve held?  Being able to…

Read More

Are You Ready for Cloud Regulations?

Are You Ready for Cloud Regulations?

Across the globe, cloud concentration risk is coming under greater scrutiny. The UK HM Treasury department recently issued a policy paper “Critical Third Parties to the Finance Sector.” The paper is a proposal to enable oversight of third parties providing critical services to the UK financial system. The proposal would grant authority to classify a third party as “critical” to the financial stability and welfare of the UK financial system, and then provide governance in…

Read More

Making the World a Better Place with Data

Making the World a Better Place with Data

Much of the hype around big data and analytics focuses on business value and bottom-line impacts. Those are enormously important in the private and public sectors alike. But for government agencies, there is a greater mission: improving people’s lives. Data makes the most ambitious and even idealistic goals—like making the world a better place—possible. This is intrinsically worthwhile, but it has now been codified as part of the Federal Data Strategy and its stated mission to “fully leverage…

Read More

Get Hands-on in the Cisco Crosswork Automation Sandbox

Get Hands-on in the Cisco Crosswork Automation Sandbox

Cisco Crosswork Network Automation is a microservices platform that brings together streaming telemetry, big data, and model-driven application programming interfaces (APIs) to redefine how service providers conduct network operations. Cisco Crosswork Network Automation offers a platform to collaborate, and build an application ecosystem around on-box innovation. The Cisco Crosswork Network Automation product suite is a highly scalable and efficient operations automation framework. It enables service providers to quickly deploy intent-driven, closed-loop operations. You can plan,…

Read More

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast: “The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said. Metrics that create a narrative and show how the business compares to competitors, the wider industry, and globally against all businesses give a clear picture that allows…

Read More

What is DNS and how does it work?

What is DNS and how does it work?

The Domain Name System (DNS) is one of the foundations of the internet, working in the background to match the names of web sites that people type into a search box with the corresponding IP address, a long string of numbers that no one could be expected to remember. It’s still possible for someone to type an IP address into a browser to reach a website, but most people want an internet address to consist…

Read More

Microsoft Patches Windows Zero-Day as Attackers Exploit it in the Wild

Microsoft Patches Windows Zero-Day as Attackers Exploit it in the Wild

Microsoft patched a zero-day bug in its latest Patch Tuesday update this week that allowed remote execution on Windows machines and which is already being exploited in the wild. CVE-2022-22047 is an elevation of privilege vulnerability in the Windows Client/Server Runtime Subsystem (CSRSS), which is responsible for Windows features, including console windows and the shutdown process. Details on how to exploit the bug are understandably scarce given that it has not yet been publicly disclosed, but…

Read More

Joseph Biffar named VP of Asset Protection at Chico’s FAS

Joseph Biffar named VP of Asset Protection at Chico’s FAS

Joseph Biffar named VP of Asset Protection at Chico’s FAS | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,838 2,839 2,840 2,841 2,842 4,071