Capital Group Appoints Marta Zarraga as Global Chief Information Officer

Capital Group Appoints Marta Zarraga as Global Chief Information Officer

Investment firm Capital Group has appointed Marta Zarraga as its new global chief information officer. In the role, Zarraga will be responsible for overseeing the organization’s technology and cybersecurity. She joins the company with 25 years of experience in the information security industry, including as global chief information officer at Aviva and chief information officer at Vodafone and British Telecom. Capital Group explained that Zarraga was selected for her strong technical qualifications, holding a Master’s…

Read More

How a 0G network can help home alarms systems provide the highest quality protection

How a 0G network can help home alarms systems provide the highest quality protection

How a 0G network can help home alarms systems provide the highest quality protection | 2021-02-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

The importance of pentesting and practical steps to build a program

The importance of pentesting and practical steps to build a program

The importance of pentesting and practical steps to build a program | 2021-02-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Cloud-based solutions playing crucial role in current and future of commercial security space

Cloud-based solutions playing crucial role in current and future of commercial security space

Cloud-based solutions playing crucial role in current and future of commercial security space | 2021-02-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Introduction to Terraform and ACI – Part 5

Introduction to Terraform and ACI – Part 5

If you haven’t already seen the Introduction to Terraform posts, please have a read through. Here are links to the first four posts: Introduction to Terraform Terraform and ACI​​​​​​​ Explanation of the Terraform configuration files Terraform Remote State and Team Collaboration Terraform Providers – How are they built? So far we’ve seen how Terraform works, ACI integration, and remote state. Although not absolutely necessary, sometimes it’s useful to understand…

Read More

Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use | McAfee Blogs

Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use | McAfee Blogs

On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora, Inc.  As we disclosed the findings to Agora in April 2020, this lengthy disclosure timeline represents a nonstandard process for McAfee but was a joint agreement with the vendor to allow sufficient time for the development and release of a secure SDK. The release of the SDK mitigating the vulnerability took place on December 17th,…

Read More

Top 100 Managed Security Service Providers (MSSPs)

Top 100 Managed Security Service Providers (MSSPs)

Well, let’s start with the basics. What is MSSP? It is short for Managed Security Service Provider. As the name suggests MSSPs are providers of different managerial security services. Examples of some managerial services are managing firewalls, detecting intrusion, keeping an eye out for new threats 7x24x365, anti-virus services, patch management, identity management, regulatory compliance gap analysis, anti-phishing training, solving cyber emergency problems like ransomware, security assessments, and much more.  From SMBs to large organizations,…

Read More

Arista Networks, Inc. Reports Fourth Quarter and Year End 2020 Financial Results

Arista Networks, Inc. Reports Fourth Quarter and Year End 2020 Financial Results

SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks, Inc. (NYSE: ANET), an industry leader in cognitive cloud networking for large datacenter and campus environments, today announced financial results for its fourth quarter and year ended December 31, 2020. Fourth Quarter Financial Results Revenue of $648.5 million, an increase of 7.1% compared to the third quarter of 2020, and an increase of 17.4% from the fourth quarter of 2019. GAAP gross margin of 63.9%, compared to GAAP gross…

Read More

Ransomware is Evolving – Agencies Must Prioritize Data Backup

Ransomware is Evolving – Agencies Must Prioritize Data Backup

By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage The threat of ransomware is not new – but we are seeing a renewed focus since the onset of COVID-19. With the majority of the Federal workforce remote, the landscape is changing rapidly and threats are evolving. The Cybersecurity and Infrastructure Security Agency (CISA) – along with other agencies – has released several alerts since the beginning of the pandemic, citing new and emerging…

Read More

PCI Secure SLC Program Expands Vendor Eligibility with Version 1.1

PCI Secure SLC Program Expands Vendor Eligibility with Version 1.1

Today, the PCI Security Standards Council (PCI SSC) published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI Secure SLC Standard is one of two standards that are part of the PCI Software Security Framework (SSF). It provides security requirements and assessment procedures for software vendors to integrate into their software development lifecycles and to validate that secure lifecycle management practices are in place.

Read More
1 3,832 3,833 3,834 3,835 3,836 4,082