Port of Los Angeles to secure its supply chain with a Cyber Resilience Center

Port of Los Angeles to secure its supply chain with a Cyber Resilience Center

Port of Los Angeles to secure its supply chain with a Cyber Resilience Center | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime

COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime

COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

Managing security on mobile devices through mobile certificate management

Managing security on mobile devices through mobile certificate management

Managing security on mobile devices through mobile certificate management | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 minutes with Jake Kouns – K-12 cybersecurity challenges during the pandemic

5 minutes with Jake Kouns – K-12 cybersecurity challenges during the pandemic

5 minutes with Jake Kouns – K-12 cybersecurity challenges | 2020-12-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Extremism in the United States in 2021: What’s out there and where are the risks?

Extremism in the United States in 2021: What’s out there and where are the risks?

Extremism in the United States in 2021: What’s out there and where are the risks? | 2021-01-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

From a Single Pane of Glass, to Functional Dashboards

From a Single Pane of Glass, to Functional Dashboards

For the longest time, or as far as I can remember, the holy grail of all networking platforms has been the need for a single pane of glass, that single source of all information that you would need to be most effective. So, what is a single pane of glass?    If you take it at face value, it simply means a window that consists of a single square frame through which you can peek…

Read More

Palo Alto Networks Completes Acquisition of Expanse

Palo Alto Networks Completes Acquisition of Expanse

SANTA CLARA, Calif., Dec. 15, 2020 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced it has completed its acquisition of Expanse Inc., a leader in attack surface management. Expanse brings a unique level of visibility to security through the continuous scanning of exposed assets. This functionality is both critical and timely: in the case of the SolarWinds vulnerability this week, Expanse is able to provide organizations with the ability to…

Read More

The Cloud Operating Model – VMware Cloud Community

The Cloud Operating Model – VMware Cloud Community

The Cloud Operating Model represents a new way of operating for IT Organizations. It enables organizations to take advantage of the benefits of cloud, through the adoption of cloud best practices and technologies, and apply them to workloads wherever they reside.     Join us at the latest “Cloud Management Monthly” podcast where we discuss how to evolve the people, process and technological capabilities of your IT organization to support the innovation demands of your…

Read More

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

Hot patching and isolating potentially affected resources are on the IT response schedule as enterprises that employ SolarWinds Orion network-monitoring software look to limit the impact of the serious Trojan unleashed on the platform. The supply-chain attack, reported early this week by Reuters and detailed by security researchers at FireEye and Microsoft involves a potential state-sponsored, sophisticated actor gained access to a wide variety of government, public and private networks via Trojanized updates to SolarWind’s…

Read More

How to prepare for quantum computing cybersecurity threats

How to prepare for quantum computing cybersecurity threats

Find out two steps your business can take now to prepare employees, as well as infrastructure, for possible quantum computing-related cybersecurity risks. Image: iStockphoto/a-image Quantum computers will likely become the next disruptive technology. They have the ability to reduce computer processing from years to hours or even minutes, and to solve problems heretofore unsolvable using current computing technology. There will be another type of disruption if the “powers that be” do not start thinking about…

Read More
1 2,470 2,471 2,472 2,473 2,474 2,541