Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office.  The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work…

Read More

How humans make decisions, and how that affects cloud computing

How humans make decisions, and how that affects cloud computing

As a cloud economist at VMware, I think a lot about the process of how humans make decisions. In previous articles, I have written about how economics evolved, in a larger sense, with the arrival of behavioral economics. There has also been framing devices used in the teaching of economics. For example, from the 70s to the 90s, that framing was around incentives, and how humans can react to incentives. The rise in popularity of…

Read More

Oracle July 2021 Critical Patch Update Addresses 231 CVEs

Oracle July 2021 Critical Patch Update Addresses 231 CVEs

Oracle addresses 231 CVEs in its third quarterly update of 2021 with 342 patches, including 49 critical updates. Background On July 20, Oracle released its Critical Patch Update (CPU) for July 2021, the third quarterly update of the year. This CPU update contains fixes for 231 CVEs in 342 security updates across 26 Oracle product families. Out of the 342 security updates published this quarter, 13% of patches were assigned a critical severity. Medium severity…

Read More

Cybersecurity risk: The number of employees going around IT security may surprise you

Cybersecurity risk: The number of employees going around IT security may surprise you

The findings detail a complex security balancing act between IT teams and users; especially in the age of remote work and virtual collaboration at scale. Image: GettyImages/Maskot Last month, cybersecurity company Hysolate published a report about the “Enterprise Security Paradox,” highlighting challenges associated with enabling IT freedoms while ensuring tight security procedures. The findings detail a complex balancing act between IT teams and network users. Calibrating this equilibrium is particularly challenging in the age of…

Read More

Cybersecurity lags behind as IoT devices proliferate, according to a new report

Cybersecurity lags behind as IoT devices proliferate, according to a new report

About one-quarter of respondents do not incorporate any of the listed measures to protect these devices and many feel as though consumers are not responsible for smart and IoT device security. Image: GettyImages/Andrey Suslov The modern smart home is brimming with a vast array of interconnected devices to help humans preheat ovens, set the ambiance around the house and even remotely feed the family pet. However, these internet-enabled devices also present new security risks and…

Read More

Moving OT to the cloud means accounting for a whole new host of security risks

Moving OT to the cloud means accounting for a whole new host of security risks

ICS systems managed via cloud software are open to exploits that could be destructive enough to cause physical damage to industrial systems. Here’s how to protect your operational technology network. chombosan, Getty Images/iStockphoto In the race to move operational technology (OT) and industrial control systems (ICS) to the cloud, critical vulnerabilities in popular cloud management software from CODESYS and programmable logic controllers (PLCs) made by WAGO Corp. have been uncovered.  The report, from Claroty research…

Read More

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT convergence is an oft-repeated term, and maybe it’s the wrong term. From a technology standpoint, IT/OT convergence has been occurring since at least the 1990s when HMI/Operator Stations began running on Windows and when Ethernet began displacing deterministic custom LAN protocols in the OT realm. This technology convergence has continued with networking, cybersecurity, virtualization, edge, zero trust, etc. The biggest change since the 1990s is that the time lag between technology being common in…

Read More

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

A bipartisan Senate bill would require some businesses to report data breaches to law enforcement within 24 hours or face financial penalties and the loss of government contracts. The legislation from Senate Intelligence Chair and Democratic Senator Mark Warner with Republican Senators Marco Rubio and Susan Collins is just one of several new cybersecurity bills that will likely be debated this year. If passed, the bill could require certain U.S. businesses to do much more…

Read More

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity | 2021-07-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Economics of VMC on Dell EMC – VMware Cloud Community

The Economics of VMC on Dell EMC – VMware Cloud Community

Over the past year, in my work as a Cloud Economist here at VMware supporting the VMC on Dell EMC offering, I’ve had the privilege to run TCO analysis with many organizations across multiple industries and locations. In that time, I have found that some of these TCO studies produce negative results, but for a few industries and their use cases, the results are positive. Here are a few observations. But first, a word on…

Read More
1 2,178 2,179 2,180 2,181 2,182 2,589