Behind the scenes: A day in the life of a cybersecurity expert

Behind the scenes: A day in the life of a cybersecurity expert

Leading a team is kind of like when a burglar alarm goes off and “you’re the police,” says the head of cybersecurity at ExpressVPN. Image: ExpressVPN Aaron Engel was born in Seabrook, Texas, a Houston suburb with about 10,000 people, in 1984. His dad, a high school teacher, scored discounts on computer products, so Aaron got a Commodore 64 at a “very, very young age.” But Engel’s first dream job at age 10 was to…

Read More

7 Safety Tips to Schooling in a Digital World | McAfee Blogs

7 Safety Tips to Schooling in a Digital World | McAfee Blogs

This fall, many students are headed back-to-school full time. However, just as workplaces now accommodate for remote work, schools are accommodating hybrid learning environments. While this may signal the end of things like snow days, it’s also created a new, more flexible style of learning that relies on computers, online connectivity, and apps to connect students with teachers and learning resources. It’s also a trend that’s not without risk, as evidenced by the more than 900 cybersecurity incidents, including personal data breaches, since 2016, according to the K-12 Cybersecurity…

Read More

7 Safety Tips to Schooling in a Digital World

7 Safety Tips to Schooling in a Digital World

This fall, many students are headed back-to-school full time. However, just as workplaces now accommodate for remote work, schools are accommodating hybrid learning environments. While this may signal the end of things like snow days, it’s also created a new, more flexible style of learning that relies on computers, online connectivity, and apps to connect students with teachers and learning resources. It’s also a trend that’s not without risk, as evidenced by the more than…

Read More

Multi-Cloud Strategy Should Include Enterprise Data Strategy

Multi-Cloud Strategy Should Include Enterprise Data Strategy

VMware and Accenture recently expanded our partnership with the launch of a dedicated new business group, Accenture VMware Business Group, to help organizations adopt a cloud-first strategy—accelerating migration to the cloud, building modern apps more rapidly, and using the cloud as a foundation for innovation and new business models, ultimately realizing greater value. I recently sat down with Philippe Chauffard, Senior Managing Director for the Accenture Infrastructure Engineering Business to discuss the Accenture VMware Business…

Read More

PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

Nine critical vulnerabilities in a popular hospital pneumatic tube software could give attackers control of infrastructure and allow them to launch additional attacks that cripple healthcare operations. Image: ZDNet The software used to control pneumatic tubes in over 3,000 hospitals around the world has nine critical vulnerabilities that could halt hospital operations if exploited by a savvy attacker.  Discovered by researchers at security platform provider Armis and dubbed PwnedPiper, the vulnerabilities are in the Nexus…

Read More

4 reasons to prioritize developers’ infrastructure needs

4 reasons to prioritize developers’ infrastructure needs

As companies make digital transformation both an immediate priority and an ongoing process for the future, I see a worrying trend in many organizations. While organizations commit resources and priorities to delivering the best digital experience to both internal and external customers through their production infrastructures, they may not extend the same attention and support to the development teams and rapid development processes. The result is lost developer hours and lost dollars as their time…

Read More

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,307 2,308 2,309 2,310 2,311 2,731