How to show an ROI on cybersecurity spends

How to show an ROI on cybersecurity spends

It’s not easy to justify cybersecurity spends based on financial gains. Read tips on how to improve the odds. anyaberkut, Getty Images/iStockphoto One of the toughest jobs that cybersecurity professionals face is convincing C-suite executives there is an actual Return On Investment (ROI) from cybersecurity spends. There are ways to eliminate the ROI disconnect between the C-suite and the IT department, says the author of the Hitachi Systems Security blog Cybersecurity Budgeting 101: How to…

Read More

Apprenticeships Highlighted as Potential Solution to Cyber-Skills Crisis

Apprenticeships Highlighted as Potential Solution to Cyber-Skills Crisis

Offering apprenticeships could help to encourage more young people into the cybersecurity sector, alleviating skills shortages, according to a new poll run by Infosecurity Europe. The region’s top cybersecurity event, held annually by Infosecurity publisher Reed Exhibitions, asked its Twitter followers for their thoughts on the ongoing skills crisis in the industry. Some 43% argued that apprenticeships, in which trainees learn on-the-job whilst studying for a formal qualification, would be a good fit for a…

Read More

Delivery Biz Exposes 400 Million Records in Privacy Snafu

Delivery Biz Exposes 400 Million Records in Privacy Snafu

A popular south Asian delivery company exposed 400 million records containing customers’ personal information after misconfiguring an Elasticsearch server, according to researchers. A team from reviews site Safety Detectives found the 200GB trove during a simple IP address check on specific ports. It was left wide open with no password protection or encryption, meaning anyone with the server’s IP address could have accessed the database. The team soon traced the leak back to Bykea, a…

Read More

US Breach Volumes Fell 19% in 2020 as Ransomware Surges

US Breach Volumes Fell 19% in 2020 as Ransomware Surges

The number of publicly reported US data breaches and leaks last year dropped 19% as attackers continued to move away from mass theft of customer data to more lucrative tactics like ransomware, according to a leading non-profit. The Identity Theft Resource Center (ITRC) compiled its annual report from company announcements, mainstream news reports, government agencies, recognized security firms and researchers, and other non-profits. In total, it recorded 1108 incidents, down by nearly a fifth on…

Read More

esxsi.com – How to Install vSphere 7.0 – vSAN 7.0

esxsi.com – How to Install vSphere 7.0 – vSAN 7.0

This second post in a new lab series provides a walkthrough for installing the latest iteration of vSAN 7. At the time of writing the latest version of vSAN is vSAN 7.0 Update 1. To read about what’s new see vSphere 7 and vSAN 7 Headline New Features. VMware vSAN is a software-defined storage solution baked directly into the vSphere hypervisor. vSAN enables aggregation of local or directly-attached devices and pools them together across hosts…

Read More

The world of the 46th President

The world of the 46th President

The world of the 46th President | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Top 10 cybersecurity predictions for 2021

Top 10 cybersecurity predictions for 2021

Top 10 cybersecurity predictions for 2021 | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Combating extortionware in 2021: A rising attack method for the modern day hacker

Combating extortionware in 2021: A rising attack method for the modern day hacker

Combating extortionware in 2021: A rising attack method for the modern day hacker | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Data detoxing in the New Year

Data detoxing in the New Year

Data detoxing in the New Year | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Leveraging gamification for security awareness training

Leveraging gamification for security awareness training

Leveraging gamification for security awareness training | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,569 2,570 2,571 2,572 2,573 2,691