Building a resilient enterprise with threat intelligence

Building a resilient enterprise with threat intelligence

Building a resilient enterprise with threat intelligence | 2020-11-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Identity is the new cloud perimeter

Identity is the new cloud perimeter

Identity is the new cloud perimeter | 2020-11-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybersecurity industry veteran, Jon DiMaggio, joins Analyst1 as Chief Security Strategist

Cybersecurity industry veteran, Jon DiMaggio, joins Analyst1 as Chief Security Strategist

Cybersecurity industry veteran, Jon DiMaggio, joins Analyst1 as Chief Security Strategist | 2020-11-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Physical security’s role in building the “new normal”

Physical security’s role in building the “new normal”

Physical security’s role in building the “new normal” | 2020-11-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals | 2020-11-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Are enterprise meetings broken? – Cisco Blogs

Are enterprise meetings broken? – Cisco Blogs

It’s Monday morning. You’ve scheduled a call with key teams to prepare for a busy week. From around the world, your team joins one by one. Well, they try to anyway. Some can’t find the invitation link. Or can’t get the tool to launch. Others don’t receive a calendar notification. Several find that their mobile device can’t connect; a few join without audio or video. One person tries to join on the wrong platform and…

Read More

SOCwise: A Security Operation Center (SOC) Resource to Bookmark | McAfee Blogs

SOCwise: A Security Operation Center (SOC) Resource to Bookmark | McAfee Blogs

Core to any organization is managing cyber risk with a security operations function whether it be in-house or outsourced. McAfee has been and continues their commitment to protecting cyber assets. We are dedicated to empowering security operations and with this dedication comes expertise and passion. Introducing SOCwise a monthly series of blogs, podcasts and talks driven by two highly experienced and devoted security operations professionals.  This is an ongoing resource of helpful advice on SOC…

Read More

NetApp launches cloud-native storage solution for containers

NetApp launches cloud-native storage solution for containers

After its purchase of cloud storage automation specialist Spot for $450 million this past June, NetApp is releasing its first new product under the brand. Called Spot Storage, it’s a “storageless” solution that’s designed to enable automated administration of cloud-native, container-based applications. NetApp describes Spot Storage as a cloud-based, serverless offering for application-driven architectures that run microservices-based applications in Kubernetes containers. “Serverless computing” is a bit of a misnomer. Your application and data still reside…

Read More

Get bent on cyber intent

Get bent on cyber intent

Get bent on cyber intent | 2020-11-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Five tips for chief information security officers to increase their strategic value to the CEO and board of directors

Five tips for chief information security officers to increase their strategic value to the CEO and board of directors

Five tips for chief information security officers to increase their strategic value to the CEO and board of directors | 2020-11-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies….

Read More
1 3,391 3,392 3,393 3,394 3,395 3,454