Top 10 AWS Security Misconfiguration

Top 10 AWS Security Misconfiguration

Swift cloud adoptions spurred on by the global pandemic has led to oversights, errors, or ill-informed cloud service configuration choices (commonly referred to misconfigurations). You may have heard that securing the cloud can be complex, but something as “simple” to stop as a misconfiguration can ultimately lead to the unintended exposure of mission-critical information and assets. Major cosmetic retailer, Estee Lauder, experienced a major breach due to a misconfiguration, resulting in more than 440 million…

Read More

Are your critical IT assets safe from cyberattacks?

Are your critical IT assets safe from cyberattacks?

Are your critical IT assets safe from cyberattacks? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Top ten checklist: Identifying your next video surveillance storage system

Top ten checklist: Identifying your next video surveillance storage system

Top ten checklist: Identifying your next video surveillance storage system | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Expect 2022 to be the year of cybersecurity

Expect 2022 to be the year of cybersecurity

Expect 2022 to be the year of cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

CCPA enforcement: Implications on the big data ecosystem

CCPA enforcement: Implications on the big data ecosystem

CCPA enforcement: Implications on the big data ecosystem | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Miro Pihkanen named CSO and Board Member at OwlGaze

Miro Pihkanen named CSO and Board Member at OwlGaze

Miro Pihkanen named CSO and Board Member at OwlGaze This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Carrie Weber named CRO at LendingHome

Carrie Weber named CRO at LendingHome

Carrie Weber named CRO at LendingHome This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More

The hidden threat of business collaboration tools

The hidden threat of business collaboration tools

The hidden threat of business collaboration tools This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Peter Hoff named VP of Cyber Security and Risk at Wursta

Peter Hoff named VP of Cyber Security and Risk at Wursta

Peter Hoff named VP of Cyber Security and Risk at Wursta This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Considering the consumer privacy conundrum in a data-filled digital world

Considering the consumer privacy conundrum in a data-filled digital world

Considering the consumer privacy conundrum in a data-filled digital world | 2021-06-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 13 14 15 16