Maintaining cybersecurity as digital identities expand

Maintaining cybersecurity as digital identities expand

<!– Maintaining cybersecurity as digital identities expand | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Per Mar Security remains resilient as threats evolve

Per Mar Security remains resilient as threats evolve

As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape. According to Dan Turner, CIO at Per Mar, the evolution of the Cisco security portfolio has helped the company remain cyber resilient during the pandemic and beyond. We recently spoke with Turner to discuss how Per Mar uses Cisco technology to rapidly detect and mitigate threats, while still enabling employees to work from wherever…

Read More

API insecurity costing the US billions annually

API insecurity costing the US billions annually

<!– API insecurity costing the US billions annually | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How the Cloud Upended Security – and How Encryption Helps Restore It

How the Cloud Upended Security – and How Encryption Helps Restore It

By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out of control. Once a user or customer has signed up for a service or purchased a product, they usually have no idea about where their data is being stored, with whom it is shared or how it is secured. The adoption of cloud services – while very beneficial in many ways – have made it nearly impossible…

Read More

Proofpoint: Social engineering attacks slipping past users

Proofpoint: Social engineering attacks slipping past users

Some of the most effective tricks used for social engineering attacks are being overlooked or underestimated. That’s according to security vendor Proofpoint, whose 2022 Social Engineering report concluded that many companies mistakenly assume that cybercriminals are unwilling or unable to use tactics such as extended conversations, legitimate services and hijacked email threads in order to dupe their targets into opening malware and following phishing links. Proofpoint, which specializes in tools and services to counter…

Read More

Before, during and after a cyberattack

Before, during and after a cyberattack

<!– Before, during and after a cyberattack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties

#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties

Organizations are still neglecting to secure their supply chains, according to panellists at a session during Infosecurity Europe 2022. Panel chair and security consultant Peter Yapp warned that fewer than 10% of organizations have reviewed their suppliers’ security. “Attacks on the supply chain will only increase,” he said. Firms face a growing volume of attacks on their software vendors, and managed service providers. Criminal groups are following the lead of nation-state actors in using the…

Read More

Microsoft includes IoT devices under its Secured-core program

Microsoft includes IoT devices under its Secured-core program

Addressing security concerns associated with the growing momentum for edge computing, Microsoft is making its Edge Secured-core program for Windows-based IoT devices generally available. Added as a new certification under the Azure Certified Device program, Edge Secured-core is for IoT devices running a full operating system, such as Windows 10 IoT or Linux. While support for Windows 10 IoT is generally available, it is still in preview for Linux. IoT devices at the network edge…

Read More

US and Canada OSPAs nomination deadline approaching

US and Canada OSPAs nomination deadline approaching

<!– US and Canada OSPAs nomination deadline approaching | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Remote Operations in Oil & Gas

Remote Operations in Oil & Gas

Trend Overview “Remote Asset Operations” was seen as the highest RoI investment out of all ten use cases described in the 2020 survey by JWN. The Digital Oilfield Report that published these findings goes on to identify “Remote Asset Inspection” and “Remote Asset Monitoring” to be the second and third choice by survey respondents. Remote operations are key to leveraging digital technology in the oilfeild. A few years ago, everyone believed the way to achieve…

Read More
1 2,917 2,918 2,919 2,920 2,921 4,094