Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Getting ahead of the new normal: Counter-drone security

Getting ahead of the new normal: Counter-drone security

Today, commercially available drones are being used as weapons. Flying improvised explosive devices (IEDs) first emerged in the Iraq and Syrian conflicts around 2016. Terrorist organizations released videos of drones used for surveillance and reconnaissance as early as 2014. It did not take long for sophisticated criminals and drug cartels to mirror those tactics of foreign terrorist groups. One cartel has created a drone unit for this specific task. The developments in the Ukraine conflict…

Read More

Leveraging visitor management data for enterprise safety

Leveraging visitor management data for enterprise safety

Leveraging visitor management data for enterprise safety | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Have we declared “open season” on CISOs?

Have we declared “open season” on CISOs?

Have we declared “open season” on CISOs? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Top security conferences of 2023

Top security conferences of 2023

Top security conferences of 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

You’re a good leadership lesson, Charlie Brown

You’re a good leadership lesson, Charlie Brown

You’re a good leadership lesson, Charlie Brown | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The characteristics of a thought leader

The characteristics of a thought leader

The characteristics of a thought leader | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top security career challenges for 2023

Top security career challenges for 2023

Top security career challenges for 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Prepare for Future Security Career Challenges

Prepare for Future Security Career Challenges

Prepare for Future Security Career Challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3 19