Common Cloud-Native Security Misconfigurations & Solutions

Common Cloud-Native Security Misconfigurations & Solutions

Cloud configuration errors are a significant concern for stakeholders invested in modern DevOps processes, thanks to the quantity of cloud-native software used in production environments these days (think of microservices, as well as serverless and containerized workloads such as Kubernetes). Misconfigured cloud environments can result in everything from poor performance, to system downtime, to data breaches. Cloud-native architectures mean the introduction of new attack surfaces. Complex architectures with various network stack components can be involved…

Read More

Incident Response Services & Playbooks Guide

Incident Response Services & Playbooks Guide

Cybersecurity Awareness Month 2022 Series No matter the size of a business, it faces the risk of a cyberattack. Over 50% of organizations experienced a cyberattack. And while proactive protection is ideal, there is no silver bullet when it comes to security—meaning you should plan for incident response as well. Yet, 63% of C-level executives in the US do not have an incident response plan, according to a report by Shred-It. That’s where an incident…

Read More

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Decrease the Risk Assessment Time Gap Towards Continuous Assessment Semi-annual penetration tests get a box checked and keep you out of compliance jail, but cybersecurity has moved to near-real time and so too must your assessment. Continuous monitoring has been an important goal, but we need to advance it to making continuous decisions based on that continuous monitoring. Even events such as authenticating to use a VPN are too infrequent to make actionable judgements: in…

Read More

Tips for employer social media screening

Tips for employer social media screening

Tips for employer social media screening | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Pros and Cons of 5G

Pros and Cons of 5G

With the introduction of the 5G Stand Alone (SA) method for operating a 5G base station independently by an independent 5G core network, 5G will finally be able to simultaneously support three different requirements: enhanced mobile broadband (eMBB) (high speed and large capacity), ultra-reliable and low-latency communication (URLLC), and massive machine type communication (mMTC) (ultra-mass terminal). Pros and Cons of 5G According to Deloitte Insights, there were 756 private network deployments in enterprises worldwide as of…

Read More

Biden Cybersecurity Executive Order: Ex-US Secret Service Reflects

Biden Cybersecurity Executive Order: Ex-US Secret Service Reflects

In response to the crippling ransomware attack on Colonial Pipeline, President Biden signed Executive Order 14028, “Improving the Nation’s Cybersecurity,” on May 12, 2021. Biden’s Executive Order aimed to protect critical infrastructure from further attacks by modernizing the nation’s cybersecurity. Reflecting on the past 15 months, I look at the effectiveness of the Executive Order, its challenges, and what CISOs from businesses of all sizes and sectors can learn to strengthen their cybersecurity strategies. Overview…

Read More

MBTA founds compliance office to address transit safety concerns

MBTA founds compliance office to address transit safety concerns

MBTA founds compliance office to address transit safety concerns | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

3 Hybrid Cloud Security Challenges & Solutions

3 Hybrid Cloud Security Challenges & Solutions

The accelerated shift to the cloud was mostly borne out of necessity due to the influx of remote workers and changing customer demands requiring more business agility. According to Forrester, 94% of US enterprise infrastructure decision makers are using at least one type of cloud deployment. While there is a push to be cloud-native, the reality is that most companies will keep their “crown jewels” or critical systems on private clouds or on-prem, while leveraging…

Read More

Top 5 Cloud Security Innovations Presented at AWS re:Inforce 2022

Top 5 Cloud Security Innovations Presented at AWS re:Inforce 2022

A CNAPP can have many benefits if employed in your cloud environment, including: Increased perspective and better context of your cloud environment enables you to hunt, detect, investigate, and respond faster to threats. Consolidated security information allows you to see risks from across your cloud infrastructure and applications in a single compliance-aligned dashboard, leading to improved security posture. Allowing developers to focus on what they do best: developing. By baking security directly into each stage…

Read More

Cyber Security Managed Services 101

Cyber Security Managed Services 101

MSPs can also perform regular testing of backups and disaster recovery plans to ensure that the most effective processes, procedures, and policies are in place when an attack strikes. Lastly, they can provide ongoing cyber awareness training to address user-specific paths like phishing and poor security hygiene, if contractually obliged. Cyber insurance No longer a nice-to-have, cyber insurance is an absolute must for organizations of any size. Unfortunately, an uptick in ransomware attacks and costly…

Read More
1 6 7 8 9 10 16