The “Office of the CISO”: A New Structure for Cybersecurity Governance

The “Office of the CISO”: A New Structure for Cybersecurity Governance

When it comes to cybersecurity governance and management, there is no “one size fits all” approach. Today’s CISOs have a far wider range of responsibilities than their predecessors as heads of IT security. The CISO role is no longer purely technical, focused on hardware and endpoint protection and on operations within the organisational perimeter. Today’s CISO is as likely to be involved with software security, cloud applications, security awareness, and user training. Reporting lines are…

Read More

Oracle WebLogic Detection and Mitigation

Oracle WebLogic Detection and Mitigation

Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS platform. Trend Micro Cloud One™ includes seven security services that help developers build securely and quickly from the moment code is committed into their repository. It’s integrated with Trend Micro Vision One™, which uses its industry-leading XDR capabilities to collect and correlate data across multiple security layers. Both products leverage automation,…

Read More

This Week in Security News – December 17, 2021

This Week in Security News – December 17, 2021

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage. Read on: A Look into Purple Fox’s Server Infrastructure In this blog, Trend Micro sheds light on the later stages of Purple…

Read More

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign. By: Abraham Camba, Jonna Santos, Gilbert Sison, Jay Yaneza December 17, 2021 Read time:  ( words) We recently published how Squirrelwaffle emerged as a loader using two exploits in a recent spam campaign in the Middle East. Further monitoring and analysis from our incident response and extended detection and response teams (IR/XDR)…

Read More

Three Things to Consider for Your Enterprise Hybrid Strategy

Three Things to Consider for Your Enterprise Hybrid Strategy

By Tyler Affolter When enterprises were forced to sharply accelerate their fulltime remote site strategies in early 2020, there was an interesting split in perceived effectiveness. Enterprises at the time reacted to the pandemic by leveraging and trying to scale existing technologies (VPN, bandwidth), which was challenging and expensive. This caused them to look closely at alternative options that would allow remote working at scale. Coming out of the pandemic, organizations then made long-term decisions…

Read More

Value Stream Management Predictions and Opportunities for 2022

Value Stream Management Predictions and Opportunities for 2022

If you feel like you’ve been hearing a lot about digital transformation and Value Stream Management in recent months, it’s for good reason: New research reveals 96% of organizations have started adopting digital transformation initiatives. When asked how they’ll enhance their transformation effectiveness, “improving product lifecycles,” a core value proposition of Value Stream Management, was the top-rated response. In this article, I’ll provide a look at the findings from this research and outline what Value…

Read More

New Jersey Cancer Care Providers Settle Data Breach Claim

New Jersey Cancer Care Providers Settle Data Breach Claim

A trio of healthcare providers in New Jersey has agreed to pay $425,000 and adopt new security measures to settle a legal claim involving a double data breach.  The state of New Jersey alleged that Regional Cancer Care Associates LLC, RCCA MSO LLC, and RCCA MD LLC (collectively “RCCA”) failed to adequately safeguard the personal data and protected health information (PHI) of thousands of cancer patients. More than 105,200 patients (including 80,333 New Jersey residents) were affected…

Read More

Log4j flaw needs immediate remediation

Log4j flaw needs immediate remediation

After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the recently disclosed vulnerability in open source Java-logging Apache Log4j software.   Log4j or Log4Shell has been around a long time—it was released in January, 2001—and is widely used in all manner of enterprise and…

Read More

Flaw in Log4j needs immmediate remediation

Log4j flaw needs immediate remediation

After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the recently disclosed vulnerability in open source Java-logging Apache Log4j software.   Log4j or Log4Shell has been around a long time—it was released in January, 2001—and is widely used in all manner of enterprise and…

Read More

CNCF Certified Solutions Now Qualify for VMware’s Partner Ready Badge

CNCF Certified Solutions Now Qualify for VMware’s Partner Ready Badge

Certified Kubernetes solutions will automatically qualify for VMware’s Partner Ready for Tanzu badge   Dedicated to the advancement of cloud native computing technologies, VMware is a proud founding member of the Cloud Native Computing Foundation (CNCF). With solutions such as VMware Tanzu, VMware empowers users to build, run, and manage modern apps on any cloud. All VMware products under the Tanzu umbrella conform to CNCF standards.   To strengthen our commitment to CNCF and our partner ecosystem, VMware…

Read More
1 3,132 3,133 3,134 3,135 3,136 3,831