Spend 60 minutes learning to protect your corporate brand & reputation in the digital age

Spend 60 minutes learning to protect your corporate brand & reputation in the digital age

Spend 60 minutes learning to protect your corporate brand & reputation in the digital age | 2021-05-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Determining the right combination of visible and thermal imaging for perimeter security

Determining the right combination of visible and thermal imaging for perimeter security

Determining the right combination of visible and thermal imaging for perimeter security | 2021-05-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

“Network Security” the Biggest Concern for Public Cloud Adoption

“Network Security” the Biggest Concern for Public Cloud Adoption

Cloud misconfigurations represent something that’s plaguing many organizations’ cloud adoption efforts. For example, a 2020 report found that 91% of cloud deployments contained at least one misconfiguration that left organizations exposed to potential digital threats. Those weaknesses contributed to more than 200 data breaches between 2018 and 2020, noted SC Magazine, with those security incidents exposing more than 30 billion records. Another 2020 report found that misconfigurations were the underlying cause of 196 data breaches…

Read More

Biden executive order bets big on zero trust for the future of US cybersecurity

Biden executive order bets big on zero trust for the future of US cybersecurity

The United States federal government has validated, confirmed, and required zero trust. For the US government and its suppliers, this executive order represents massive change. Image: Andriy Onufriyenko / Getty Images This post focuses on the Executive Order on Improving the Nation’s Cybersecurity and its impact on cybersecurity and the zero trust approach. The Biden administration also published a fact sheet: “President Signs Executive Order Charting New Course to Improve the Nation’s Cybersecurity and Protect Federal Government…

Read More

DockerCon Is Almost Here! – Docker Blog

DockerCon Is Almost Here! – Docker Blog

Can you feel it? DockerCon is just days away. There’s still time to register before the one-day, free, virtual extravaganza takes place this Thursday, May 27. Demonstrations, product announcements, company updates — you name it, it’s on the program. All of it focused on modern application delivery in a cloud-native world. Do DockerCon your way. There’s tons of options. Be sure to catch our line-up of top-notch keynote speakers, which includes Docker CEO Scott Johnston,…

Read More

The Colonial Pipeline cyberattack is a (another) call for zero trust and resilience in industrial companies

The Colonial Pipeline cyberattack is a (another) call for zero trust and resilience in industrial companies

The incidents of the past month have confirmed the lack of cyber resilience in many industrial companies and is another reminder of the benefits of zero trust in mitigating the effects of ransomware. Image: Getty Images/iStockphoto On Friday, May 7, 2021, Colonial Pipeline safely shut down its pipeline operations due to a ransomware incident in its corporate network. Colonial Pipeline transports 45% of the fuel along the East Coast of the United States through 5,500 miles of…

Read More

Return to the office: Organizational resiliency and the new normal

Return to the office: Organizational resiliency and the new normal

Over the past 14 months, organizations have had to navigate the abrupt discontinuity caused by COVID-19 and the ensuing regulations. Today, sports fans are returning to arenas and students are back in schools, but most office workers are still on work-from-home orders. Returning to the workplace will constitute a new normal, but what will that look like in an unknown post-COVID world? I spoke to several CEOs, CIOs, and CISOs (all in the US) to…

Read More

5 Tips to Building a Cyber-Smart Culture

5 Tips to Building a Cyber-Smart Culture

Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning critical infrastructure, SMBs, retail organizations, and commercial businesses alike, addressing cybersecurity with internal users is key. Successful internal cyber-defense programs are attainable. But, first, start from within- embody every person in the organization by taking a team approach that centers on a cultural mindset. What does it mean to be “cyber-smart”? Building a cyber-smart culture means continuously…

Read More

New Ponemon Institute Study Reveals Cloud Account Compromises Cost Organizations Over $6 Million Annually | Proofpoint US

New Ponemon Institute Study Reveals Cloud Account Compromises Cost Organizations Over  Million Annually | Proofpoint US

SUNNYVALE, Calif., May 25, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, and Ponemon Institute, a top IT security research organization, today released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached $6.2 million over a 12-month period, according to over 600 IT and IT security professionals in the U.S. In addition, 68 percent of these survey respondents…

Read More

Employers are watching remote workers and they’re monitoring these activities

Employers are watching remote workers and they’re monitoring these activities

While many employers are tapping technologies to monitor workflows, a new report highlights potential drawbacks and even resentment among surveilled employees. Image: GettyImages/Laurence Dutton Employers are increasingly using monitoring software to keep an eye on day-to-day operations. In fact, 75% of work conversations could be recorded and assessed by 2025, according to Gartner. On Thursday, ExpressVPN published the results of a recent survey highlighting workforce sentiments regarding telecommuting, employer monitoring software and more. While many…

Read More
1 2,413 2,414 2,415 2,416 2,417 2,732