Standing Out With Sustainable Manufacturing

Standing Out With Sustainable Manufacturing

For The Climate And Your Costs As I talk with all of my customers in the manufacturing space, one thread stays consistent: Manufacturing was one of the hardest hit industries due to COVID-19. The mass shuttering of factories, global supply chain challenges, and reduced headcount aligned to the Great Resignation has forced manufacturers to think about their evolution to stay competitive. Because of these external forces, there has been a renewed focus on the needs…

Read More

The Age of Zero Trust Security

The Age of Zero Trust Security

It’s a perfect confluence of events for zero trust to take center stage in the world of cyber security: the rise of hybrid and remote work, the ongoing shift to cloud services, the continuing growth of mobile devices in the workplace, and an onslaught of sophisticated attacks that can impact entire supply chains. Never have organizations faced so many challenges in protecting their data resources, and never have they needed to be more suspicious of users and…

Read More

Communicating risk to the C-suite

Communicating risk to the C-suite

<!– Communicating risk to the C-suite | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Help meet the cybersecurity demand by getting CompTIA-certified

Help meet the cybersecurity demand by getting CompTIA-certified

As cyberattacks get more prevalent and more complex throughout the world, businesses are looking for cybersecurity experts. Learn the skills they need with this online training. Image: djvstock/Adobe Stock There are a number of cybersecurity skills that are in high demand, providing a great opportunity for those interested in taking their careers to the next level. If you’ve ever considered working in cybersecurity, now is a great time to get on the certification path because…

Read More

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

The increased deployment of core business applications in the cloud and the shift to remote work brought on by the pandemic have obliterated any notion of the traditional “corporate moat” style of security. Today’s hybrid workplace, where employees are on the road, working from home and maybe visiting the office once or twice a week, has forced network and security teams to adopt a more flexible approach to managing the network, identities, and authentication. Zero…

Read More

4 ways to identify and prevent insider threats

4 ways to identify and prevent insider threats

<!– 4 ways to identify and prevent insider threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Your social media account hasn’t been hacked, it’s been cloned!

Your social media account hasn’t been hacked, it’s been cloned!

A recent Facebook post from a family member made me realize that I needed to write about an overused term. A term, that when used, causes chaos and concern. I don’t blame the family member for using it, I’ve seen it used hundreds of times over the past few years and I’ve seen IT and cybersecurity professionals respond without correcting, even, on occasion, offering bad advice. So, what is the term? Hacked. We all know…

Read More

5 Things to know about the UK’s National Cyber Security Centre (NCSC)

5 Things to know about the UK’s National Cyber Security Centre (NCSC)

#1 The history of the National Cyber Security Centre The UK’s first cybersecurity strategy was launched in 2009 and outlined that whatever the shape of the cybersecurity mission, it made no sense to silo it away from other aspects of national security. To be effective, it had to be able to take advantage of high-grade intelligence and other security capabilities. The strategy outlined how the country needed to invest more in getting the public and…

Read More

Google Cloud boosts open-source security, simplifies zero-trust rollouts

Google Cloud boosts open-source security, simplifies zero-trust rollouts

Google Cloud is rolling out new security services designed to address enterprise challenges including securing open-source software and accelerating the adoption of zero-trust architectures. At its annual Google Cloud Security Summit, the company said it’s building on its Invisible Security effort, which promises to bake security into tools and services that enterprises and other customers use most. One example is a new service called Assured Open Source Software (Assured OSS), which is aimed at making it easier for organizations…

Read More

Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts

Google Cloud boosts open-source security, simplifies zero-trust rollouts

Google Cloud is rolling out new security services designed to address enterprise challenges including securing open-source software and accelerating the adoption of zero-trust architectures. At its annual Google Cloud Security Summit, the company said it’s building on its Invisible Security effort, which promises to bake security into tools and services that enterprises and other customers use most. One example is a new service called Assured Open Source Software (Assured OSS), which is aimed at making it easier for organizations…

Read More
1 3,091 3,092 3,093 3,094 3,095 4,169