Cyber GRC: Quantifying Risk in Monetary Terms

Cyber GRC: Quantifying Risk in Monetary Terms

Risk. Do you think of it as something negative – or as an opportunity? What if you could quantify risks in dollar terms – and manage them precisely? It might make you think about them more opportunistically – as something you had more control over and could leverage strategically. That’s the promise of risk quantification – and today, it’s a reality. Leaving heat maps behind Risk has traditionally been measured in generic terms, often as…

Read More

Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats

Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats

By Hugo Sanchez, Founder and CEO of rThreat Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the weekend, resulting in thousands of spam emails warning of a fake cyberattack that were sent to individuals and companies nationwide. In the statement released to address the incident, the bureau clarified that the attack did not compromise their system or allow an outsider to gain access to their data….

Read More

VMware Cloud on AWS: What’s New in January 2022 – Cloud Blog – VMware

VMware Cloud on AWS: What’s New in January 2022 – Cloud Blog – VMware

First of all, Happy New Year everyone. Hope you all had a nice break with your families over the holidays. Now, let’s talk more about VMware Cloud on AWS. VMware Cloud on AWS is a jointly engineered hybrid cloud service that extends on-premises vSphere environments to a VMware Software-Defined Data Center (SDDC) running on Amazon Elastic Compute Cloud (Amazon EC2) elastic, bare-metal infrastructure that is fully integrated as part of AWS. Customers can spin up…

Read More

5 ways to prepare for a winter weather emergency

5 ways to prepare for a winter weather emergency

5 ways to prepare for a winter weather emergency | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Implementing strong cybersecurity hygiene standards

Implementing strong cybersecurity hygiene standards

Implementing strong cybersecurity hygiene standards | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Cybersecurity Laws – Get Ready Today to Save Some Money Tomorrow

Cybersecurity Laws – Get Ready Today to Save Some Money Tomorrow

It looks likely that the UK will join a growing number of nations promoting cybersecurity’s importance for businesses including the introduction of new laws. Amongst the proposals being considered are adding new powers to the UK Cyber Security Council that could significantly change the reporting requirements associated with security incidents. From what has been shared to date, two points that stand out are as follows:   More firms providing essential digital services should follow strict cyber…

Read More

IT Must Meet Digital Ambition

IT Must Meet Digital Ambition

By Steven Fatigante Can your Information Technology organization keep up with your digital business ambitions? For most organizations, the answer is no – at least not right now. Accelerating time-to-value requires focused effort and priority across the entire operating model. However, with the proper approach and leadership driving change – organizations can achieve more than they ever imagined. Accelerate time-to-value Most organizations have similar pain points. It’s even worse for incumbents that have set ways…

Read More

How to Detect Apache Log4j Vulnerabilities

How to Detect Apache Log4j Vulnerabilities

How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January 27, 2022 Read time:  ( words) In my previous blog, I reviewed how to detect Apache HTTP server exploitation from vulnerabilities in October. Weirdly enough, I wrote that article before the Apache Log4j (Log4Shell) news broke in December 2021. So I’m back to write about how to detect the infamous Log4j vulnerability (CVE-2021-44228) that…

Read More

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems

By measuring the exposure of DDS services, in one month we found 643 distinct public-facing DDS services in 34 countries affecting 100 organizations via 89 internet service providers (ISPs). Of the DDS implementations by seven distinct vendors (one of which we were initially unaware of), 202 leaked private IP addresses (referring to internal network architecture details), and seven supposedly secret URLs. Some of these IP addresses expose unpatched or outdated DDS implementations, which are affected…

Read More

Artificial Intelligence Needs People Intelligence

Artificial Intelligence Needs People Intelligence

By Sean Foley Enterprises yearn for the competitive advantage that ML and AI can offer their business, but often prioritize technology strategically over people to unlock the value of their data. The hype about AI and ML, and the ease of access to it through cloud tooling, belies the complexity of effectively leveraging these capabilities. Why are AI and ML critical capabilities to your business and how will pushing their introduction or expanding their use…

Read More
1 3,233 3,234 3,235 3,236 3,237 4,015