Thousands of US Public Sector Ransomware Victims in 2021

Thousands of US Public Sector Ransomware Victims in 2021

An estimated 2323 local governments, schools and healthcare providers in the US were compromised by ransomware in 2021 after another bumper year for financially motivated attackers, according to Emsisoft. The security vendor claimed in its latest research that healthcare providers (1203) were the most affected by such attacks during the year, followed by schools (1043) and finally state and municipal governments and agencies (77). However, despite most attacks today resulting in double extortion, where victims…

Read More

The next frontier in cybersecurity: Mitigating normalcy bias

The next frontier in cybersecurity: Mitigating normalcy bias

The next frontier in cybersecurity: Mitigating normalcy bias | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Designing a 100-Day Sprint for OT Cybersecurity: What to Consider

Designing a 100-Day Sprint for OT Cybersecurity: What to Consider

As we begin a new year, many organizations will enter a “goal-setting and strategic planning” season. During this time, individuals are re-energized and motivated to record new accomplishments for their professional development. Traditional corporate goal setting aligns with fiscal calendars and forces companies and individuals to build goals in chunks of 365 days. But why set your deadline based on the Earth’s orbital period? What if you could achieve relevant and meaningful goals within just…

Read More

Compliance – How to Fulfill Multiple Objectives Using the CIS Controls

Compliance – How to Fulfill Multiple Objectives Using the CIS Controls

Earlier this year, I wrote about what’s new in Version 8 of the Center for Internet Security’s Critical Security Controls (CIS Controls). An international consortium of security professionals first created the CIS Controls back in 2008. Since then, the security community has continued to update the CIS Controls to keep pace with the evolution of technology ecosystems and emerging threat vectors—all the way to Version 8 and the 18 Controls contained therein. Those security measures…

Read More

Philip Morris’ CDIO on self-development, product IT and a smoke-free future

Philip Morris’ CDIO on self-development, product IT and a smoke-free future

Some could argue that moving from being the CIO of one of the largest sporting brands on the planet to the CTO of a cigarettes company is an unusual move, if only on the assumption that their ideals and objectives are surely in stark contrast. But try telling that to Philip Morris International’s forthright CDIO Michael Voegele, who made the jump from Nike in 2019 prior to being promoted to his current position earlier this…

Read More

Microservice Security: How to Proactively Protect Apps

Microservice Security: How to Proactively Protect Apps

Microservice Security: How to Proactively Protect Apps Serverless Security Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you. By: Melanie Tafelski, Fernando Cardoso January 19, 2022 Read time:  ( words) Microservices Overview As many organizations moved to serverless functions to maximize agility and performance in the cloud, microservices became the new go-to design architecture for modern web…

Read More

Storage as a Service: More than Just On-Demand Consumption

Storage as a Service: More than Just On-Demand Consumption

Regardless of industry, if you’re a business or IT leader today, you’re seeing the emergence of the digital transformation divide: a gap between those organizations who’ve sprinted ahead and those being left behind. Despite major investment in digital transformation, 67% of CEOs feel they’re losing ground, according to KPMG, while top performers have doubled their profits in the last 12 months, according to McKinsey. In a word, digitalization has become ‘do or die.’ What’s driving…

Read More

How to Achieve Multi-Cloud Success Without Compromise – Cloud Blog – VMware

How to Achieve Multi-Cloud Success Without Compromise – Cloud Blog – VMware

Multi-cloud is here to stay. In fact, 73% of enterprises are using two or more public clouds today.1 The reality? Most organizations struggle to transform to this model and face many obstacles before they can fully reap its benefits. Multi-cloud for the win Why the move to multi-cloud? Successful multi-cloud organizations report a 35% revenue increase from faster modern app delivery; 41% fewer hours and costs spent on IT infrastructure; and 35% productivity savings across…

Read More

The why and how of AI-enhanced infrastructure – Cisco Blogs

The why and how of AI-enhanced infrastructure – Cisco Blogs

Part 2 of the Series: AI-Enhanced Infrastructure for AI Ops. In this blog, I’ll continue exploring how an AI-enhanced infrastructure can be used by IT operations teams today.  I’ll discuss the technologies that are involved and how they are powering an AIOps model for ITOps and NetOps teams. What are AI-enhanced technologies? I would like to establish a shared definition: When we talk about technologies powered by AI, we are referring to a set of…

Read More

Cisco UCS and Cisco MDS – Cisco Blogs

Cisco UCS and Cisco MDS – Cisco Blogs

Better together At a concert, few years ago, the director spoke to the audience and said something that resonated in my mind for long time. His words went like this: the value of the ensemble is greater than the sum of the value of the individual musicians. The meaning was clear. He wanted to illustrate the significance of playing together, as an orchestra, rather than a group of individual sound musicians. The same concept comes…

Read More
1 3,357 3,358 3,359 3,360 3,361 4,385