Every Buzzword Was Born of Data

Every Buzzword Was Born of Data

Many of today’s hottest technologies come at us as buzzwords. Artificial intelligence (AI). Machine learning (ML). Edge computing. Internet of Things (IoT). These and many other innovations promise business advancements. Business leaders have an idea what these technologies can offer—but not always why and how to deploy them to deliver maximum return on investment. This, coupled with the meteoric rise of software companies that often star in media articles, means the power of data is…

Read More

Emergency-proofing critical infrastructure: The role of consultants

Emergency-proofing critical infrastructure: The role of consultants

Emergency-proofing critical infrastructure: The role of consultants | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Put the focus on business continuity planning

Put the focus on business continuity planning

Put the focus on business continuity planning | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Tips, Advice, and Insights on Achieving Buy-in for Cybersecurity Projects

Tips, Advice, and Insights on Achieving Buy-in for Cybersecurity Projects

A CISO’s job can be one of the most stressful in cybersecurity. It can sometimes feel like an avalanche of responsibilities, all in the pursuit of keeping an organization safe. The problem more often than not comes down to the issue of obtaining funding for new technology that can make the job easier. In reality, CISOs can’t always obtain the executive buy-in necessary for receiving that funding. Their organization’s security posture then suffers as a result. To…

Read More

Integrity: A Key Facet of Zero Trust | The State of Security

Integrity: A Key Facet of Zero Trust | The State of Security

On May 12, The White House published its Executive Order (EO) on Improving the Nation’s Cybersecurity. The directive outlined a set of focus areas intended to improve cybersecurity for the federal government and critical infrastructure sectors including information sharing, supply chain security, endpoint detection and response, and cloud security. Of particular emphasis was the need for broad implementation of Zero Trust Architecture (ZTA), a set of design principles intended to continuously revalidate the authenticity and…

Read More

Apache Log4j: Mitigation for DevOps

Apache Log4j: Mitigation for DevOps

Apache Log4j: Mitigation for DevOps Cloud Native What can DevOps teams do to mitigate Apache Log4j risks? Explore how to secure your apps for today and against future vulnerabilities. By: Melanie Tafelski January 05, 2022 Read time:  ( words) What is Apache Log4j? You’ve most likely heard of the critical flaw CVE-2021-44228, discovered in the popular Java-based library, Apache Log4j. Nicknamed Log4Shell, it impacts numerous Apache projects, including Druid, Dubbo, Flink, Flume, Hadoop, Kafka, Solr, Spark,…

Read More

Building Modern Applications with Security Embedded

Building Modern Applications with Security Embedded

AWS Marketplace DevOps Workshop Series HANDS-ON Lab Building Modern Applications with Security Embedded – DevSecOps In this workshop, you’ll learn how to leverage Trend Micro – Cloud One – Application Security with your serverless applications running on AWS Lambda or containerized applications running on AWS Fargate. If you are interested in making cloud security more efficient, proactive, and gain visibility to help lead your developers, cloud architects, and DevOps engineers, this workshop is for you!…

Read More

What to Do If You’re Caught Up in a Data Breach

What to Do If You’re Caught Up in a Data Breach

It happens with more regularity than any of us like to see. There’s either a headline in your news feed or an email from a website or service you have an account with—there’s been a data breach. So what do you do when you find out that you and your information may have been caught up in a data breach? While it can feel like things are out of your hands, there are actually several…

Read More

What to Do If You’re Caught Up in a Data Breach

What to Do If You’re Caught Up in a Data Breach

It happens with more regularity than any of us like to see. There’s either a headline in your news feed or an email from a website or service you have an account with—there’s been a data breach. So what do you do when you find out that you and your information may have been caught up in a data breach? While it can feel like things are out of your hands, there are actually several…

Read More

Google makes the perfect case for why you shouldn’t use Chrome

Google makes the perfect case for why you shouldn’t use Chrome

Google says Manifest V3 is focused on security, privacy and performance, but it could also break Chrome browser extensions used by millions of people. Image: Lightspring/Shutterstock Back in 2020, Google released Manifest V3, which it called a step in the direction of security, privacy and performance.  It took a while, but on Dec. 9, 2021, the Electronic Frontier Foundation labeled MV3 a “conflict of interest that comes from Google controlling both the dominant web browser…

Read More
1 3,269 3,270 3,271 3,272 3,273 3,996