Cloud Cyber Risk Assessment – Sandstone CTO Weighs-in

Cloud Cyber Risk Assessment – Sandstone CTO Weighs-in

Cloud complexity Sandstone, a FinTech organization that primarily offers digital banking solutions and products, decided to go fully cloud-native in 2018 to accelerate business innovation. While the shift from on-premises to the cloud provided several operational benefits, securing a perimeter-less environment where new assets could be spun up whenever, wherever presented a new challenge for Pinnamanemi and his team. Cattle vs. pets Pinnamanemi uses the “cattle vs. pets” analogy to describe the difference of asset…

Read More

Five years after the WannaCry ransomware attack

Five years after the WannaCry ransomware attack

<!– Five years after the WannaCry ransomware attack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Emotet becomes most common malware family in Q1 2022

Emotet becomes most common malware family in Q1 2022

<!– Emotet becomes most common malware family in Q1 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Ransomwhere? All the ways that cybercriminals are advancing their craft

Ransomwhere? All the ways that cybercriminals are advancing their craft

<!– Ransomwhere? All the ways that cybercriminals are advancing their craft | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

SolarWinds data breach lawsuit takeaways for CISOs

SolarWinds data breach lawsuit takeaways for CISOs

<!– SolarWinds data breach lawsuit takeaways for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Mirai, STRRAT and Emotet botnets see resurgence in Q1 2022

Mirai, STRRAT and Emotet botnets see resurgence in Q1 2022

<!– Mirai, STRRAT and Emotet botnets see resurgence in Q1 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Former CIA CISO William MacMillan joins SalesForce security team

Former CIA CISO William MacMillan joins SalesForce security team

<!– Former CIA CISO William MacMillan joins SalesForce security team | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Samuel John Cure named CISO at AMI

Samuel John Cure named CISO at AMI

<!– Samuel John Cure named CISO at AMI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Nation-state attacks are hard to spot. It’s time for a new approach to threat detection

Nation-state attacks are hard to spot. It’s time for a new approach to threat detection

<!– Nation-state attacks are hard to spot. It’s time for a new approach to threat detection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Building, managing, and transforming security into a business enabler

Building, managing, and transforming security into a business enabler

<!– Building, managing, and transforming security into a business enabler | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 66 67 68 69 70 167