Dealing with the Cybersecurity Challenges of Digital Transformation

Dealing with the Cybersecurity Challenges of Digital Transformation

We’re back after a little hiatus with this week’s blog in the series in which I explore the “Top 10 List of the Challenges Cybersecurity Professionals Face,” as found in our Cybersecurity Insights Report 2022: The State of Cyber Resilience. Coming in at number two on our list: Dealing with the speed and complexity of digital transformation. During the COVID-19 crisis, digital transformation became even more critical. To describe digital transformation in economic terms means…

Read More

Info-Stealing Campaign Targeted Home Workers for Two Years

Info-Stealing Campaign Targeted Home Workers for Two Years

Security researchers have uncovered a likely state-sponsored information-stealing operation targeting SOHO workers over the past two years. Coinciding with the shift to mass remote working during the pandemic, the operation was focused on accessing corporate resources via less well-protected home routers, according to Lumen Technologies. It targeted at least scores of SOHO devices from manufacturers including Asus, Cisco, DrayTek and Netgear in mainly North America and Europe. It did this via three key stages: A first-stage…

Read More

3 capabilities to get more value out of your data

3 capabilities to get more value out of your data

Many organizations have become adept at collecting data at scale, but too few have mastered the art (and science) of filtering the deluge to identify insights and initiate actions that drive favorable business outcomes and increase competitive differentiation. Across industries and enterprises, data continues to explode, increasing in volume, variety, and velocity. According to IDC estimates, 64.2 zettabytes of data was created or replicated in 2020, and the amount of digital data created from 2021-2025…

Read More

Nevadan Arrested for Alleged $45m Metaverse Investment Fraud

Nevadan Arrested for Alleged m Metaverse Investment Fraud

A man was arrested in Los Angeles yesterday on suspicion of masterminding a multimillion-dollar investment fraud scheme that tricked over 10,000 victims. Neil Chandran, 50, of Las Vegas, was charged with three counts of wire fraud and two counts of engaging in monetary transactions in criminally derived property. He owned several technology companies marketed to investors as promising high returns as they were about to be acquired by a consortium of prominent business figures, according…

Read More

The CIO’s evolving role to address tighter EU sustainability regulations

The CIO’s evolving role to address tighter EU sustainability regulations

Ways to address and curtail the alarming and increasingly irreversible effects of carbon dioxide emissions are becoming more central to organizational growth, reputation, and culture. At the same time, data centers, technology churn, and all other forms of digitalization are driving electricity consumption, so the pressure on companies to act to reduce their climate footprint is increasing. To help mitigate these trends, the EU is preparing stricter reports for EU companies, and those in accordance…

Read More

Insightful analysis: how data empowers your agents

Insightful analysis: how data empowers your agents

Do you know why your customers are getting in touch? Disruptive technologies have made it easier to anticipate customer intent. For example, data-driven AI chatbots can pick off the easier customer queries, while IVR (Interactive Voice response) can automate the process of directing customers to the right people. However, chatbots and virtual assistants can only do so much. The pressure is on your agents to get it right when dealing with customers’ complex needs. Customer…

Read More

We need the Foreign Intelligence Surveillance Act more than ever

We need the Foreign Intelligence Surveillance Act more than ever

<!– We need the Foreign Intelligence Surveillance Act more than ever | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

What you need to know about PCI 4.0: Requirements 10, 11 and 12

What you need to know about PCI 4.0: Requirements 10, 11 and 12

As we continue our review of the 12 Requirements of PCI DSS version 4.0, one has to stop and consider, is it possible to have a favorite section of a standard? After all, most guidance documents, as well as regulations are seen as tedious distractions from the importance of getting the job done. However, depending on a person’s position and function in an organization, it is possible to “geek out” on some of the information…

Read More

The Developers focus, the Team quickens

The Developers focus, the Team quickens

Today, we find that there is a common tendency in larger organizations for management and oversight of development projects to be given greater importance than the actual creation of value by people writing, iterating on, and shipping code. It’s not always the case, and sometimes the lowly developer might feel like he or she is a forgotten asset, an opinion with no basis. The C-suite’s focus on longer-term strategies can, however, sometimes lead to an…

Read More

DevOps vs SRE: Differences & Similarities

DevOps vs SRE: Differences & Similarities

DevOps vs. SRE: Differences and Similarities DevOps and site reliability engineering (SRE) both aim to streamline development and operations. Because of their similar goals, some IT professionals consider SRE to be an extension of DevOps. However, they are distinct approaches between the two that need to be evaluated in order to define their working roles and responsibilities. This article compares DevOps and SRE so teams can choose which approach fits their team’s goals and culture,…

Read More
1 2,886 2,887 2,888 2,889 2,890 4,083