Use zero trust to fight network technical debt

Use zero trust to fight network technical debt

Zero trust (ZT) is a mindset and a method, not a technology. The current push to adopt ZT is driven by an urgent and growing need to make a major leap forward in risk management and attack containment in enterprise networks, a need driven home by every successive wave of ransomware. IT can use the urgency of moving to ZT to root out some of the technical debt in the environment. Specifically, it can be…

Read More

Ransomware Attacks Soar by 100% in 2021

Ransomware Attacks Soar by 100% in 2021

The number of ransomware attacks reported to the UK’s data protection regulator more than doubled between 2020 and 2021 as the pandemic raged, according to a new analysis. The study from international law firm RPC found that the number of incidents handled by the Information Commissioner’s Office (ICO) rose from 326 in 2020 to 654 in 2021. The verticals most frequently impacted by attacks in 2021 were: finance, insurance and credit (103), and education and…

Read More

What Is Multi-Factor Authentication, What Does It Have to Do with You?

What Is Multi-Factor Authentication, What Does It Have to Do with You?

Security isn’t a simple matter of caring or spending time reading manuals or being told what you can or can’t do. Security is understanding how to view the world from a different perspective: instead of functional does it work, viewing it as how can I break it. In our personal lives, it’s how can someone misuse this? Be it our social media pictures, accounts, and so on. This is a skill that people build over…

Read More

5 steps to minimum viable enterprise architecture

5 steps to minimum viable enterprise architecture

At Vault Health, CTO Steve Shi begins enterprise architecture (EA) work with a site survey of the entire IT, application, system, and data infrastructure but restricts it to two weeks with one-hour interviews about each function. Customers, whether employees or those paying for a product or service must “love” the result of this minimum viable approach to EA, says Shi. “If you don’t get customer buy-in, you will lose momentum, and if you lose momentum,…

Read More

HP gets intentional about contracting with Black IT providers

HP gets intentional about contracting with Black IT providers

HP CIO Ron Guerrier says the company’s commitment to diversity, equity, and inclusion is one of the factors that brought him to the company in September 2020. Even so, Guerrier believed that as its new CIO he could advance, even further, the company’s DEI efforts in the IT space, where Blacks in particular remain underrepresented. More specifically, Guerrier has set out to make his own IT department look more like society. “My goal is for…

Read More

Virgin Media O2 Partners with VMware to Complete 5G Roll-out Across UK and EU

Virgin Media O2 Partners with VMware to Complete 5G Roll-out Across UK and EU

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– Virgin Media O2 UK has selected VMware to help modernise its network and enable the continued success of its 5G rollout. The company will leverage VMware Telco Cloud Infrastructure to rapidly design, build, test and implement virtualised network functions, boosting innovation across its network and the delivery of new services. The collaboration has … Mon, 28 Mar 2022 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– Virgin Media O2 UK has selected…

Read More

6 Critical Areas of Cloud-Native Security That Are Influential in 2022

6 Critical Areas of Cloud-Native Security That Are Influential in 2022

Cloud computing has emerged as the go-to organizational workload choice because of its innate scalability and flexibility. However, cloud computing still comes with some security risks. Examining cloud security is an important part of adopting this new technology. Presently, cloud-native security is experiencing changes and innovations that help address security threat vectors. These areas are of significant importance for security professionals, software developers, and information technology specialists. Secret Credential Management Cloud-based applications use many application…

Read More

Tripwire ExpertOps Can Help Solve the UK’s Cybersecurity Challenges

Tripwire ExpertOps Can Help Solve the UK’s Cybersecurity Challenges

Many UK business and technology executives aren’t hopeful about their digital security going into 2022. In a survey of 3,600 business and technology executives, of which 257 were from the UK, PwC learned that a majority (61%) of respondents expected to see an increase in reportable ransomware attacks next year. An even greater proportion (64%) of UK respondents said that they were planning to witness a rise in attacks targeting their cloud services over that…

Read More

Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?

Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?

By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and malware attacks today. Specifically exploiting privilege sprawl—or the always-on, always-available administrative access to servers, workstations, and laptops—has become a lucrative opportunity for cyber attackers, allowing them to significantly increase their rate of success with stolen credentials and elevated privileges and, due to implicit trust between systems, the ease of damaging lateral movement. According to Verizon’s 2021 DBIR…

Read More

Terraform Tutorial: Drift Detection Strategies

Terraform Tutorial: Drift Detection Strategies

A common misconception among DevOps teams using infrastructure as code (IaC) tools is that the templates they use to run their deployments are infallible sources of truth. Instead, a fundamental challenge of architectures built using tools like Terraform is configuration drift. This occurs when the actual state of your infrastructure begins to accumulate changes and deviates from the configurations defined in your code. Configuration drift can occur for many reasons, regardless of how good your…

Read More
1 3,150 3,151 3,152 3,153 3,154 4,090