Holding up a black mirror to society

Holding up a black mirror to society

Holding up a black mirror to society | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Risk assessment strategies: Be careful what you eat

Risk assessment strategies: Be careful what you eat

Risk assessment strategies: Be careful what you eat | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Why Enterprises Need to Consolidate and Standardize Access Control

Why Enterprises Need to Consolidate and Standardize Access Control

By Gal Helemski, co-founder and CTO, PlainID Today’s digital-centric enterprises need to manage a multitude of access rules across everything from repositories and directories to applications, increasing complexity levels. As a result, it is increasingly difficult to control and audit both authorizations and entitlement. What’s more, organizations worldwide have embraced remote and hybrid working environments. This means traditional security perimeters have expanded which has led to rising risk in data breaches. These scenarios reinforce the…

Read More

Mitigate Risk by Securing Third Party Software and Environments

Mitigate Risk by Securing Third Party Software and Environments

Software Security Requires Ongoing Vigilance Against New and Evolving Vulnerabilities  By Tim Kenney, Chief Operating Officer, SOOS Businesses Need Software and Today’s Software is Built with Open Source. Modern businesses need specialized software to run their organizations. Today, more than 90% of new software is built on open source components called packages.  Developers have access to an almost limitless array of open source packages to build their products, which has been transformational for the industry….

Read More

Ian Wallace named Senior Advisor for Strategy at CISA

Ian Wallace named Senior Advisor for Strategy at CISA

Ian Wallace named Senior Advisor for Strategy at CISA | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Microsoft pauses once-touted macro security change

Microsoft pauses once-touted macro security change

Microsoft is rolling back a recent change to block VBA macros by default, baffling many in the security community. Pictured: A Microsoft logo is seen during the 2015 Microsoft Build Conference on April 29, 2015, at Moscone Center in San Francisco. (Photo by Stephen Lam/Getty Images) In a move that has baffled much of the security community, Microsoft told Office 365 administrators Thursday that it would “roll back” a default block of VBA macros downloaded…

Read More

Aon Hack Exposed Sensitive Information of 146,000 Customers

Aon Hack Exposed Sensitive Information of 146,000 Customers

Aon recently disclosed that 145,889 of its North American customers had their sensitive information exposed in a large data breach. The British multinational financial services firm that sells a range of risk-mitigation products announced that hackers breached its systems “at various times” from December 29 2020 to February 26 2022. Aon disclosed the breach in a Securities & Exchange Commission filing in February. Further details were disclosed three months later, on May 26. In a…

Read More

Lawyers Urged to Stop Advising Clients to Pay Ransomware Demands

Lawyers Urged to Stop Advising Clients to Pay Ransomware Demands

The legal profession has been urged to stop advising clients to pay ransomware demands in a joint letter issued today by the UK’s National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO). The open letter asked the Law Society to remind its members that they should not advise clients to pay ransomware demands when they fall victim to a cyber-attack. It emphasized that paying ransoms does not reduce the risk of future attacks on individuals or…

Read More

Simplified SaaS Security for MSPs – Cisco Secure is now open in Canada

Simplified SaaS Security for MSPs – Cisco Secure is now open in Canada

Managed services are an essential and fast-growing part of the security market, growing 14% annually. This opportunity presents new challenges MSPs must juggle day to day, including onboarding vendors and driving customer acquisition, all while making sure to provide robust IT solutions for your diverse set of clients. Clients are demanding more security and capabilities for a hybrid workforce, which provides a great opportunity for MSPs like you to grow your business. We love our…

Read More

TOGAF certification guide: Options, training, cost, exam info

TOGAF certification guide: Options, training, cost, exam info

TOGAF is a longstanding, popular, open-source enterprise architecture framework that is widely used by large businesses, government agencies, non-government public organizations, and defense agencies. Offered by The Open Group, TOGAF advises enterprises on how best to implement, deploy, manage, and maintain enterprise architecture. The Open Group offers several options for those who want to be certified in the TOGAF 9. Earning a cert is a great way to demonstrate to employers that you are qualified…

Read More
1 2,847 2,848 2,849 2,850 2,851 4,067