3 must-read books on ISO 27001 – IT Governance UK Blog

3 must-read books on ISO 27001 – IT Governance UK Blog

As you start your ISO 27001 implementation project, you probably want to know about much as possible. Some people attend training courses to pick up the knowledge of ISO 27001, and others go one step further, hiring an ISO 27001 consultant to guide them through the process. Those are both excellent options for those with the time and budget, but what if you’re looking for a less expensive approach? In those cases, you can never…

Read More

Healthcare security: a specialized field

Healthcare security: a specialized field

Healthcare security: a specialized field | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Making videoconferences more secure

Making videoconferences more secure

Making videoconferences more secure | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode | 2021-03-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

To Patch or Not to Patch in OT – That Is the Real Challenge

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc. There are many methods and techniques that an organization can then use to manage this risk. One of the most commonly used methods is patching. At the…

Read More

Four Strategies to Mitigate Pass-the-Cookie Attacks

Four Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security Agency) of a spate of attacks targeting cloud environment configurations, supposedly occurring as a result of the increase in remote working. Once you add to the mix the fact that corporate and personal devices were being used – often simultaneously – to access…

Read More

Future voices – education needs in the 21st Century – Cisco Blogs

Future voices – education needs in the 21st Century – Cisco Blogs

Learning for all ages moved online overnight when Covid struck. Many students adapted incredibly well to this new environment while others struggled due to lack of access. This experience has taught us valuable lessons and it’s forced us to think again about learning delivery. While there are very few cases where 100% virtual learning is the best long-term solution, there are definitely aspects of our recent experience that providers and students will want to keep….

Read More

NetApp dumps its HCI hardware in favor of Kubernetes

NetApp dumps its HCI hardware in favor of Kubernetes

NetApp, one of many players in the hyperconverged infrastructure (HCI) hardware business, plans to end production of its NetApp HCI hardware and focus instead on its Project Astra Kubernetes platform. HCI is split into two categories, software and hardware. On the software side, it’s roughly an even split in marketshare between Nutanix and VMware. On the hardware side, IDC and Gartner both list HCI leaders as HP Enterprise, Dell Technology, Cisco Systems, and “the rest…

Read More

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security experts observed a surge in the attacks against Microsoft Exchange mailservers worldwide. Check Point Research team reported that that in…

Read More

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

By Michael Morris, Director of Global Business Development, Endace We’ve all read the news and seen the stats, so it comes as no surprise that SecOps teams are incredibly short-staffed and there is no quick fix. But the actual numbers are quite staggering: more than four million professionals are needed worldwide to close the cybersecurity skills gap, and that number is expected to increase exponentially in years to come ((ISC)2 Research, Nov 2019). SecOps and…

Read More
1 3,782 3,783 3,784 3,785 3,786 4,096