Developing a risk-based cybersecurity approach

Developing a risk-based cybersecurity approach

Developing a risk-based cybersecurity approach | 2021-02-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cybercrime on the rise: Plotting a way forward

Cybercrime on the rise: Plotting a way forward

Cybercrime on the rise: Plotting a way forward | 2021-02-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Cisco to Drive Disaggregation Across Optical Vendor Ecosystem as Part of the Telecom Infra Project Phoenix Initiative – Cisco Blogs

Cisco to Drive Disaggregation Across Optical Vendor Ecosystem as Part of the Telecom Infra Project Phoenix Initiative – Cisco Blogs

The Telecom Infra Project (TIP) has been championing a new approach to building and deploying telecom network infrastructure since 2016. TIP is a global community of companies – including Cisco – and organizations working together to accelerate the development and deployment of open, disaggregated, and standards-based technology solutions that deliver the high-quality connectivity that the world needs now – and in the decades to come. We are proud to apply our domain expertise and industry…

Read More

Affected by a Data Breach? Here Are 5 Security Steps You Should Take | McAfee Blog

Affected by a Data Breach? Here Are 5 Security Steps You Should Take | McAfee Blog

Affected by a Data Breach? Here Are Security Steps You Should Take We share personal information with companies for multiple reasons: to pay for takeout at our favorite restaurant, to check into a hotel, or to collect rewards at the local coffee shop.  While using a credit card is convenient, it actually gives away more personal data than we may realize. ShinyHunters Breach Last week, the hacker, ShinyHunters, leaked information from companies including Pixlr.com, Bonobos.com,…

Read More

How to compile NGINX for ModSecurity support on Ubuntu Server 20.04

How to compile NGINX for ModSecurity support on Ubuntu Server 20.04

Jack Wallen walks you through the manual process of installing ModSecurity for NGINX on Ubuntu Server 20.04. Image: iStock/sdecoret ModSecurity is the most widely-used and respected web application firewall for open source web servers. It can be used with both Apache and NGINX to provide protection from a number of HTTP attacks (such as SQL injections and cross-site scripting) against web-based applications like WordPress and Nextcloud. In other words, this module should be considered a…

Read More

A Framework for Continuous Security – Cisco Blogs

A Framework for Continuous Security – Cisco Blogs

This is part one of a four-part blog series about DevSecOps. Technology is at the core of business today. Maintaining the resiliency of critical data, assets, systems, and the network is mission-critical; crucial to meeting business goals. As a result, development operations (DevOps) professionals must continuously improve the overall resilience —along with the security posture — of workloads, software, and applications (Figure 1). To do this at scale and speed requires the integration of a…

Read More

The Best Kept Secret in Mobile Networks: A Million Saved is a Million Earned – Cisco Blogs

The Best Kept Secret in Mobile Networks: A Million Saved is a Million Earned – Cisco Blogs

I’m about to let you in on a little secret, actually it’s a big secret. What if I told you that you could save millions – even tens of millions – of dollars in two hours or less? If you were the CFO of a Mobile Operator, would this get your attention? What if I told you that the larger and busier your mobile network is, the more money you could save? What if the…

Read More

The Big 8: How to heighten cybersecurity governance

The Big 8: How to heighten cybersecurity governance

The Big 8: How to heighten cybersecurity governance | 2021-02-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 reasons why Active Directory is the CISO’s Achilles heel

5 reasons why Active Directory is the CISO’s Achilles heel

5 reasons why Active Directory is the CISO’s Achilles heel | 2021-02-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Risk, the misunderstood discipline

Risk, the misunderstood discipline

As a risk professional, when I look across the various organisations that I have worked with, one thing is clear: Risk is either embraced and used to drive smart decision making, or it is seen as a huge blocker for progress that must be avoided at all costs!  When risk management is understood, it can really be used to drive a technology department into the future, and at progressive speed.  Appetite vs. tolerance vs. threshold –…

Read More
1 3,854 3,855 3,856 3,857 3,858 4,070