The new problem in cybersecurity: Slaying the data dragon

The new problem in cybersecurity: Slaying the data dragon

The new problem in cybersecurity: Slaying the data dragon | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Transforming data security teams from gatekeepers to enablers

Transforming data security teams from gatekeepers to enablers

Transforming data security teams from gatekeepers to enablers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Using zero trust to safely power the business ecosystem

Using zero trust to safely power the business ecosystem

Using zero trust to safely power the business ecosystem | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Defending your perimeter: Taking an intelligent, layered approach to security

Defending your perimeter: Taking an intelligent, layered approach to security

Defending your perimeter: Taking an intelligent, layered approach to security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Threat Intelligence: Cyber Risk Management Strategies

Threat Intelligence: Cyber Risk Management Strategies

4. Old vulnerabilities remain relevant While Apache Log4Shell (Log4j) was arguably the most prominent zero-day vulnerability of 2021, older flaws remained relevant and effective as well. Data from Trend Micro™ TippingPoint™ shows that the greatest number of detections (75 million) this year were of CVE-2019-1225, a memory disclosure flaw in Microsoft’s Remote Desktop Services (RDS) discovered in August 2019. Explaining cyber risk to the board As the digital attack surface expands due to the accelerated…

Read More

IoT is magic for building automation systems. But what about security?

IoT is magic for building automation systems. But what about security?

IoT is magic for building automation systems. But what about security? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Securities Exchange Commission releases climate disclosure rule

Securities Exchange Commission releases climate disclosure rule

Securities Exchange Commission releases climate disclosure rule | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cybersecurity firm Okta investigating possible data breach

Cybersecurity firm Okta investigating possible data breach

Cybersecurity firm Okta investigating possible data breach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

AvosLocker ransomware a threat to critical infrastructure

AvosLocker ransomware a threat to critical infrastructure

AvosLocker ransomware a threat to critical infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Data privacy in 2022: Four recommendations for businesses and consumers

Data privacy in 2022: Four recommendations for businesses and consumers

Data privacy in 2022: Four recommendations for businesses and consumers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 79 80 81 82 83 167