Database Server – Don’t Let Your Stored Procedures Lack Integrity

Database Server – Don’t Let Your Stored Procedures Lack Integrity

Unfamiliar territory As a security analyst, engineer, or CISO, there are so many aspects of the field that require immediate attention that one cannot possibly know everything.  Some of the common areas of security knowledge include topics such as where to place a firewall, configuration and patch management, physical and logical security, and legal and regulatory concerns.  However, learning about an unfamiliar topic can not only serve to enhance your awareness, giving you another tool…

Read More

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit…

Read More

G4S publishes Asia Emerging Risks Report 2020

G4S publishes Asia Emerging Risks Report 2020

G4S publishes Asia Emerging Risks Report 2020 | 2020-12-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

3 myths that can derail your machine learning program

3 myths that can derail your machine learning program

3 myths that can derail your machine learning program | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Data privacy expectations in 2021: Trends to watch

Data privacy expectations in 2021: Trends to watch

Data privacy expectations in 2021: Trends to watch | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Culture shift of IT security in agile world

Culture shift of IT security in agile world

Culture shift of IT security in agile world | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How We Securely Share Data in A Remote World – Cyber Defense Magazine

How We Securely Share Data in A Remote World – Cyber Defense Magazine

By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, when it may be too late. But in an era when our essential industries are continuing to digitize, organizations need to approach cybersecurity as a foundational element of innovation. Security must evolve to enable efficient data sharing, across the company, location, and network zone boundaries….

Read More

Looking Ahead to 2021: The Things We’ll Carry Forward | McAfee Blog

Looking Ahead to 2021: The Things We’ll Carry Forward | McAfee Blog

Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020. Not so much in the sweeping and upending ways. More in the little ways. I’m thinking about the coping ways. The cobble-it-all-together ways. The little changes to make things work ways. There were plenty.  Now, with the first doses of vaccine going to those who need it most, I find myself wondering which of those…

Read More

A Hybrid Workplace Means New Threats and More Pressure on IT Leaders – Cyber Defense Magazine

A Hybrid Workplace Means New Threats and More Pressure on IT Leaders – Cyber Defense Magazine

By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% of employees want to work exclusively in the office post-pandemic. Businesses must now consider whether the remote work shift brought on by COVID-19 should become permanent. But, then again, remote work isn’t accessible or preferable for every employee. Business leaders, therefore, have important decisions to…

Read More

Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps – Cyber Defense Magazine

Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps – Cyber Defense Magazine

By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the  COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the complications of which are far from over. In accordance to scientific guidance, many nations have launched contact tracing applications to monitor, identify, alert, and reduce the spread of infections. However, the shift towards tracing apps has not always been smooth in the eyes of both…

Read More
1 140 141 142 143 144 268