A well-managed multi-cloud strategy "is a sensible approach" because it allows organizations to move different workloads between providers, but it gets a "bit more complicated when you start thinking about workload portability," says Lee Newcombe, security director, Capgemini U.K.
Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.
In today's dynamic environment, with the proliferation of a wide array of different security products and the high chance for misconfigurations, testing security is more imperative than ever, says Scott Register, vice president of security solutions at Keysight.
Join this webinar to learn how Tanium can help you achieve and maintain a comprehensive view of risk across your environment as well as the tools necessary to manage that risk in real-time and at scale. In today’s distributed environment where new threat vectors and vulnerabilities emerge daily, it’s no longer...
New Cobalt CEO Chris Manton-Jones plans to push upmarket and go after enterprise customers and leverage automation and self-service to accelerate product growth. He replaces founder Jacob Hansen, who had served as CEO since Cobalt's inception in 2013 and will remain with the firm as a board member.
The Log4j vulnerability caused plenty of stress for tech practitioners, and while it’s likely under control now, it’s essential to take the opportunity to learn from these events to improve security.
Join this interactive session to review what the latest Zero Day threat taught us about current security...
Top U.S. cybersecurity leaders continue to warn against the peril of Apache Log4j vulnerabilities, confirming on Monday that hundreds of millions of devices worldwide are likely affected by the logging utility flaw, although the response, in terms of scope and speed, has been "exceptional."
The Apache Log4j vulnerability capped the end of a long year for CISOs and incident responders, and it left them with a mitigation project that carries them well into the New Year. CISOs John Bassett and Martin Dinel discuss how their teams have tackled Log4j - and significant lessons learned.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
More credit unions now offer their members mobile applications and banking services to meet the tremendous demand and usage - no easy task. Meanwhile, security teams have also had to rapidly evolve to an influx of cyberattacks as the instances of security breaches continue to rise rapidly.
But how do you know if...
In today’s world, cyberattacks are commonplace, and countless organizations have had to deal with the fallout of a breach. Luckily, there are many cybersecurity solutions that can help decrease risk, but how do you know if your organization’s security controls will be up to the task?
This is where penetration...
The Center for Internet Security (CIS) emphasizes continuous vulnerability management in its top 10 security controls. Given the complexity of the current digital landscape, many organizations face greater cyber-risk today. Adding to this woe is the rate at which vulnerabilities are burgeoning. The coverage of attack...
VMware is warning all vCenter Server administrators to patch their software to fix a serious vulnerability that could be used to execute arbitrary code as well as a separate authentication flaw. Experts warn that these and other recent flaws are likely to be targeted by ransomware gangs.
Real-world penetration and security assessments have
uncovered the most common risks to mainframe
security. What are they?
Download this infographic for a brief, yet detailed synopsis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.