A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Real-time locating systems as a security tool

Real-time locating systems as a security tool

Real-time locating systems as a security tool | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Special Meeting of Stockholders to Vote on Pending Acquisition by Thoma Bravo to be Scheduled for Later Date Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced its Board of Directors has cancelled the 2021 Annual Meeting of Stockholders scheduled for June 15, 2021. This follows the previously announced definitive agreement, pursuant to which Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, will acquire…

Read More

Uncovering hidden cybersecurity risks

Uncovering hidden cybersecurity risks

By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of the code. Yet, our process has not changed.  A week does not go by where we are not reading about a serious vulnerability in the news and subsequently scrambling to see if we are affected. This scramble, this mad dash, is a process we have…

Read More

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

By Don Boxley, Co-founder and CEO, DH2i When it comes to optimizing Microsoft SQL Server high availability (HA) and disaster recovery (DR), there’s a strong correlation between greater database transaction processing performance, business resiliency, and profitability—particularly for workloads like those in industries like financial services, though certainly other sectors as well. The fact is that our world is connected yet fragile, which creates many challenges when it comes to database HA/DR—specifically with resilience, security, and…

Read More

NetApp makes big hybrid-cloud push

NetApp makes big hybrid-cloud push

NetApp is making a major effort to support hybrid cloud with a batch of software announcements around storage products, converged infrastructure, and cloud-management services. The main news was the release of the latest version of its flagship ONTAP software, as well as updates to other products designed to help organizations build a better hybrid-cloud strategies. ONTAP is the operating system for NetApp’s FAS (hybrid flash-disk) and AFF (all-flash) storage arrays. The latest version, 9.9, adds…

Read More

Rescuing a Linux system from near disaster

Rescuing a Linux system from near disaster

The more you know about how Linux works, the better you’ll be able do some good troubleshooting when you run into a problem. In this post, we’re going to dive into a problem that a contact of mine, Chris Husted, recently ran into and what he did to determine what was happening on his system, stop the problem in its tracks, and make sure that it was never going to happen again. Disaster strikes It…

Read More

McDonald’s suffers cyberattack in US, South Korea and Taiwan

McDonald’s suffers cyberattack in US, South Korea and Taiwan

The restaurant chain reportedly said no U.S. customer data was exposed and the attack did not involve ransomware. Image: seksan Mongkhonkhamsao/Moment/Getty Images McDonald’s is the latest company to fall victim to a cyberattack exposing customer and other data in the U.S., Taiwan and China, The Wall Street Journal has reported. The restaurant giant reportedly told the paper that it has hired external investigators to analyze unauthorized activity on an internal security system. No U.S. customer…

Read More

What’s New for DevNet Specialization?

What’s New for DevNet Specialization?

The DevNet Specialization for Cisco’s Partners is constantly evolving. A couple of weeks ago, Chuck Stickney (DevNet Specialization Lead) together with Markus Lind (CEO, Miradot), had a great discussion in one of the Partner Interactive Webinars in Cisco’s Europe/Middle East/Africa/Russia region. One of the main topics was how Miradot – our first DevNet Specialized Partner – is applying DevNet to their solutions. How DevNet is helping them transform their business and deliver successful outcomes to…

Read More

The Executive Order – Improving the Nation’s Cyber Security | McAfee Blogs

The Executive Order – Improving the Nation’s Cyber Security | McAfee Blogs

On May 12, the President signed the executive order (EO) on Improving the Nation’s Cybersecurity. As with every executive order, it establishes timelines for compliance and specific requirements of executive branch agencies to provide specific plans to meet the stated objectives. It is clear from the EO that the Executive Office of the President is putting significant emphasis on cyber threat intelligence and how it will help government agencies make better decisions about responding to…

Read More
1 3,706 3,707 3,708 3,709 3,710 4,236