We want to leapfrog our legacy culture

We want to leapfrog our legacy culture

Over her 25-year career, Deanna Steele has led IT and digital organizations at companies in various stages of startup, acceleration, and turnaround. Much of this experience has been in the retail sector, including VP roles in technology at Hot Topic, Express, and Ascena Retail, CIO at Ingram Content Group, and CI&DO at J.Jill. This past June she joined Advantage Solutions, whose data and technology solutions help retailers and brands drive demand and operate more efficiently….

Read More

Log4j vulnerability: Why your hot take on it is wrong

Log4j vulnerability: Why your hot take on it is wrong

Commentary: Those searching for a single cause for the Log4j vulnerability – whether it’s open source is not secure, or open source is not sustainable – are getting it wrong. It’s a complicated issue. Image: your/Shutterstock Excuse me if I don’t want to hear your “hot take” on the Log4j vulnerability. By all means, give me the details of what happened, as well as how it’s impacting companies like mine. Even better, give me insight…

Read More

Have you been SMISHED lately? Texting scams are on the rise

Have you been SMISHED lately? Texting scams are on the rise

RALEIGH, N.C. (WNCN) – Chances are, you’ve recently been SMISHED.  Smishing is the combination of SMS Texting and Phishing used by scammers to defraud you and it has exploded recently.  With all the robocalls out there, many folks are more inclined to not answer their phone or even respond to an email, but they will respond to a text message.  “I don’t check my emails as often as I check my texts,” said Raleigh resident Zoe Harnell. …

Read More

IFPO releases frontline security professional report

IFPO releases frontline security professional report

IFPO releases frontline security professional report | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How to execute a successful ransomware tabletop exercise

How to execute a successful ransomware tabletop exercise

How to execute a successful ransomware tabletop exercise | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Find network breaches before they crush your business

Find network breaches before they crush your business

Find network breaches before they crush your business | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Cybersecurity and Geopolitical Podcast: Episode 7

The Cybersecurity and Geopolitical Podcast: Episode 7

The Cybersecurity and Geopolitical Podcast: Episode 7 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Mitigating Industrial Production Risk with Tripwire | The State of Security

Mitigating Industrial Production Risk with Tripwire | The State of Security

It seems that the most popular topics in cybersecurity for the last year has been zero trust as well as the convergence of Information Technology (IT) and Operational Technology (OT). These developments are good, as they signal some positive motion towards better overall security. Some of the current risks are worth noting, with a forward glance to protecting specific industries such as oil and gas production plants. What qualifies Tripwire as a capable partner in this…

Read More

Data, analytics are key to efficiency for Gulf oil and gas sector

Data, analytics are key to efficiency for Gulf oil and gas sector

The interruption in demand caused by COVID-19 and the subsequent excess of supply is putting pressure on the Gulf oil and gas sector to innovate and accelerate digital transformation, say a broad cross-section of industry insiders. It’s widely acknowledged that companies in the oil and gas industry were slow to adopt emerging technology, and that many still lack an up-to-date digital transformation strategy. In a survey conducted by the consulting firm EY with oil and…

Read More

Volatile and Adaptable: Tracking the Movements of Modern Ransomware

Volatile and Adaptable: Tracking the Movements of Modern Ransomware

Volatile and Adaptable: Tracking the Movements of Modern Ransomware Ransomware Trend Micro’s tracking of modern ransomware, as well as of older families, shows which attacks are gaining momentum and which families are particularly dangerous for enterprises and private users. By: Trend Micro Research December 15, 2021 Read time:  ( words) In the first half of 2021, we saw that modern ransomware threats were still active and evolving, using double extortion techniques to victimize targets. Unlike…

Read More
1 3,395 3,396 3,397 3,398 3,399 4,355