7 Steps to Improve Your Cloud Security Posture Management – VMware Cloud Community

7 Steps to Improve Your Cloud Security Posture Management – VMware Cloud Community

As enterprises continue to rapidly adopt cloud computing, cloud security remains a primary concern. According to Cybersecurity Insiders, 94% of cybersecurity professionals confirm they’re at least moderately concerned about public cloud security, with 69% of organizations rating their team’s security readiness as average or below average. To help address the gap in cloud security readiness, we’ve outlined seven key steps to help cloud customers improve their cloud security posture management. 1. Clarify internal cloud security…

Read More

Cisco upgrades intent-based-networking performance, security, analytics

Cisco upgrades intent-based-networking performance, security, analytics

Cisco brought new features to its DNA Center network-control platform that promise to improve performance, management analytics and security for its enterprise network customers. The new software features integration of a ThousandEyes agent that bulks-up the platform’s network-intelligence monitoring, a two-fold increase in the number of clients the system can support, and improved security and operational capabilities. DNA Center is the heart of Cisco’s intent-based networking strategy and is the vendor’s core-networking control platform supporting…

Read More

CISOs: It’s time to get back to security basics

CISOs: It’s time to get back to security basics

The post-pandemic world will see cybersecurity addressed differently, said panelists during an online webinar hosted by ReliaQuest Wednesday. Image: iStock/sdecoret The cyber threat landscape has become more dangerous over the past year and the C-suite is paying greater attention—but all the tools in the world won’t help until organizations home in on good cyber hygiene. That was one of the messages from CISOs who participated in a virtual think tank webinar hosted by ReliaQuest Wednesday….

Read More

IT Administrator Sentenced for Sabotaging Employer

IT Administrator Sentenced for Sabotaging Employer

Lockdown hasn’t ended for one vengeful IT professional who carried out a cyber-attack against his former employer.  Levi Delgado, of Middletown, Delaware, was sentenced on Wednesday to home confinement after hacking into a company’s computer network, deleting its data and disabling user accounts. The 36-year-old cyber-criminal had been employed as an information technology administrator at a medical center that provides care to under-served communities, but the medical center terminated Delgado’s employment in August 2017.  After losing his…

Read More

Arrest Made Over Multi-million-dollar BEC Scam

Arrest Made Over Multi-million-dollar BEC Scam

Texas law enforcement officers have made an arrest in connection with a multi-million-dollar wire fraud and money laundering scheme involving Business Email Compromise (BEC). Guillermo Perez was taken into custody Wednesday morning for allegedly defrauding businesses and individuals of more than $2m through cyber-scams and bank fraud schemes. An indictment unsealed on June 9 accuses 26-year-old Houston resident Perez of participating in the illegal scam from at least October 2018 to October 2019. Perez is accused of impersonating…

Read More

How to secure your WordPress login with 2FA

How to secure your WordPress login with 2FA

Jack Wallen shows you how to add two-factor authentication to your WordPress sites to avoid possible unwanted intrusion. Image: Jack Wallen Nothing is perfect. No matter what you do to lock down every account you have, you’re still at risk. However, doing nothing is akin to opening the metaphorical door and inviting trouble in. You don’t want that. Even though it might seem futile, you still want to enable every possible hurdle to make the…

Read More

Data Loss Prevention in Turbulent Times

Data Loss Prevention in Turbulent Times

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of the biggest businesses on earth but unlike oil, more and more of it is being created, at an exponential pace. Around 2.5 quintillion bytes of new data every day, to be precise. The most valuable forms of data exist within enterprises. Customer data, financial data,…

Read More

Texas to Publish Data Breach Notifications

Texas to Publish Data Breach Notifications

Lawmakers in Texas have passed a bill requiring notices to be published online of any data breaches involving the personal information of 250 or more Lone Star State residents. The unanimously passed House Bill 3746, which amends the Texas Business and Commerce Code §521.053, requires the Texas Attorney General’s Office to post the breach notifications to its public-facing website. Notifications must be uploaded to the website within 30 days of receipt, and listings of organizations impacted by a…

Read More

How Cloud Native Buildpacks Simplify Container Automation

How Cloud Native Buildpacks Simplify Container Automation

When it comes to being a traditional network engineer, we often have a “go it alone” mindset. This is due to the nature of working in operations. Normally we are given a task or a series of projects that we must complete solo. This is because our teammates are just as loaded with work as we are. Although, this does not mean we can’t ask for help. The DevOps way is a completely different shift…

Read More
1 3,557 3,558 3,559 3,560 3,561 3,816