Multcloud management: Challenges for technology, people, processes

Multcloud management: Challenges for technology, people, processes

When it comes to managing hybrid and multicloud environments there are many options but no easy path nor lack of challenges. While cloud computing has been around in some form for more than a decade, tools to manage its current enterprise iterations from private, on-premises, or public locations are still evolving at a rapid rate. Gartner says that more than 90 vendors—including IBM/Red Hat, VMware, CloudBolt, Flexera, Scalr, Cisco, and Nutanix—offer varying degrees of cloud-management…

Read More

Russian Hackers Steal Data for Months in Global Supply Chain Attacks

Russian Hackers Steal Data for Months in Global Supply Chain Attacks

Russian hackers who stole red team tools from FireEye may have been in action on a much broader scale, operating a sophisticated supply chain campaign targeting multiple global organizations and governments. FireEye revealed in an update on Sunday that nation state attackers inserted malicious code into legitimate software for SolarWinds’ popular Orion product to gain remote access into victim environments. Although it didn’t name any victims or the identity of the group, a Reuters report…

Read More

The Future of Infosec: Teaching a Cybersecurity Course with Tyler Reguly

The Future of Infosec: Teaching a Cybersecurity Course with Tyler Reguly

Aside from managing Tripwire’s security research team, Tyler Reguly also teaches a college course on cybersecurity. On this episode, Tyler shares his experience teaching the next generation of cybersecurity practitioners who are about to graduate and enter the workforce. Spotify:https://open.spotify.com/episode/7G9cXfVFeFxCfoEdhZlHOk?si=IZUhcqB1Q8WqG1h9vkRhJAStitcher:https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS:https://tripwire.libsyn.com/rssYouTube:https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 The following is an edited excerpt from a recent episode of Tripwire’s Cybersecurity Podcast. Tim Erlin: Today, I am joined by Tyler Reguly, manager of software development with Tripwire and we’re here to talk about…

Read More

Combating insider threats in the age of remote work

Combating insider threats in the age of remote work

Combating insider threats in the age of remote work | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Four steps to bolster e-commerce software security this holiday season

Four steps to bolster e-commerce software security this holiday season

Four steps to bolster e-commerce software security this holiday season | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

How to protect your ecommerce data from disaster in 2021

How to protect your ecommerce data from disaster in 2021

How to protect your ecommerce data from disaster in 2021 | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Attacker dwell time: Ransomware’s most important metric

Attacker dwell time: Ransomware’s most important metric

Attacker dwell time: Ransomware’s most important metric | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

8 Key Insights from the 2020 (ISC)2 Cybersecurity Workforce Study

8 Key Insights from the 2020 (ISC)2 Cybersecurity Workforce Study

2020 has been a very interesting year for the global workforce, with the vast majority of organizations having to rapidly transition to a remote workforce with little to no prior notice thanks to the COVID-19 pandemic. The 2020 (ISC)2 Cybersecurity Workforce Study looks at the effect of this transition to remote work and how organizations have fared. It also analyzes the impact of the pandemic and the resultant transition to remote work on cybersecurity professionals….

Read More

Cloud Security Best Practices: Messy Blobs and Leaky Buckets

Cloud Security Best Practices: Messy Blobs and Leaky Buckets

Moving to the cloud means a lot more than just moving your servers and applications to the cloud; it’s also about the data – and data always has a target on it. A lot of IT departments are finding that it’s easier to meet the “five nines” (99.999%) of uptime and availability by going outside their organization and letting AWS, Microsoft, or Google handle the infrastructure and personnel needed to meet those requirements. Plus, if your…

Read More

Telegram for Business Communications: Understanding The Risks And Rewards – Cyber Defense Magazine

Telegram for Business Communications: Understanding The Risks And Rewards – Cyber Defense Magazine

By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted the pandemic’s economic effect was to accelerate existing trends, including the increasing use of technology and automation. “We’re recovering,” he said, “but to a different economy.” Indeed, the adoption of cloud-based apps that maximize flexibility and minimize friction in business communication is just such a…

Read More
1 3,697 3,698 3,699 3,700 3,701 3,821