Cybersecurity in 2021: Stopping the madness

Cybersecurity in 2021: Stopping the madness

Marc Andreessen had it right – software has eaten the world. As a result, the world can be hacked. Just look at the past few months. The SolarWinds caper – the “largest and most sophisticated attack the world has ever seen” according to Microsoft president Brad Smith – gave its Russian perps months of free reign across untold US government agencies and private companies. But stupid also works: Last month in Florida, a water treatment…

Read More

WAN challenges steer auto-rental firm to SASE

WAN challenges steer auto-rental firm to SASE

Latency and reliability concerns set car rental company Sixt on a path to rearchitect its WAN. That led the global company, which has locations in more than 100 countries, to become an early adopter of the network-security architecture dubbed secure access service edge (SASE) by research firm Gartner. SASE, pronounced “sassy,” blends SD-WAN’s network optimization features with security capabilities such as zero-trust authentication, data loss prevention, threat detection, and encryption. Driven by demand for a…

Read More

Cybersecurity in 2021: Stopping the madness

Cybersecurity in 2021: Stopping the madness

Marc Andreessen had it right – software has eaten the world. As a result, the world can be hacked. Just look at the past few months. The SolarWinds caper – the “largest and most sophisticated attack the world has ever seen” according to Microsoft president Brad Smith – gave its Russian perps months of free reign across untold US government agencies and private companies. But stupid also works: Last month in Florida, a water treatment…

Read More

Aruba chief: Enterprises must adjust to new normal of remote working

Aruba chief: Enterprises must adjust to new normal of remote working

When HPE bought Aruba in 2015, Aruba’s then-president and CEO Dominic Orr said that his company had effectively acquired HP Networking. Aruba’s performance since then has largely borne out Orr’s bullish prediction, as the company has become the driving force behind HPE’s enterprise networking efforts and dramatically grown its market share, expanding beyond its roots as a primarily mid-sized campus networking provider to become a leading competitor to the market’s 800-pound gorilla, Cisco. With HPE’s…

Read More

FTC Busts $110m Charity Fraud Operation

FTC Busts 0m Charity Fraud Operation

The Federal Trade Commission (FTC) has joined forces with nearly 40 US states to crack a major charity fraud operation that scammed victims out of more than $110m. The regulator teamed up with 46 agencies from 38 states and Washington DC, most of them state attorneys general, to shut down the work of Associated Community Services (ACS), sister companies Central Processing Services and Community Services Appeal, and two other fund-raising spin-offs run by ACS managers,…

Read More

Mitigating the hidden risks of digital transformation

Mitigating the hidden risks of digital transformation

Companies are looking to grab any technology-driven advantage they can as they adapt to new ways of working, managing employees, and serving customers. They are making bigger moves toward the cloud, e-commerce, digital supply chains, artificial intelligence (AI) and machine learning (ML), data analytics, and other areas that can deliver efficiency and innovation. At the same time, enterprises are trying to manage risk — and the same digital initiatives that create new opportunities can also…

Read More

The cyber security risks of working from home – IT Governance blog

The cyber security risks of working from home – IT Governance blog

Organisations have had to overcome countless challenges during the pandemic, but one that has continued to cause headaches is IT security for home workers. A remote workforce comes with myriad dangers, with employees relying on their home networks – and sometimes their own devices – and without the assurance of a member of your IT team on hand if anything goes wrong. But unlike many COVID-19 risks, these issues won’t go away when life eventually…

Read More

Don’t throw out your prohibited thumb drives: Liberate your workers who need more IT freedom

Don’t throw out your prohibited thumb drives: Liberate your workers who need more IT freedom

Don’t throw out your prohibited thumb drives: Liberate your workers who need more it freedom | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done. | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More
1 5 6 7 8 9 268