Lesson from Log4J: Security vulnerabilities are not just high-profile events like the recently identified Log4J exploit, but rather an ongoing threat on many fronts that need constant attention.
At the ninth annual Women in Cyber Security Conference, participants will discuss privacy and security concerns associated with smart technologies and cyberspace.
Everything as a Service (XaaS) has taken the cybersecurity field by storm, with enterprise organizations outsourcing security and development functions to third parties, including Software as a Service, Artificial Intelligence (AI) as a Service and even Ransomware as a Service. The Deloitte Everything as a Service (XaaS) Study further examines the service model.
The use of scalper bots —
a ploy that can reap and cost millions —
isn't poised to slow down. In fact, it will rise exponentially in 2022 due to the following bot community trends.
After decades of building security operation centers (SOCs) and developing enterprise cybersecurity programs, Sumo Logic Chief Security Officer (CSO) George Gerchow reflects on how best to instill a security-minded culture in an organization in the latest The Security Podcasts episode.
Betsy Soehren-Jones will further drive the adoption of essential tools infrastructure companies need to address the next generation of cybersecurity problems at Fortress Information Security.
While clean rooms are designed to allow data sharing with maximum security, different clean rooms are created with different levels of security. To build the dream clean room, enterprises must consider a host of security factors.
Video surveillance and video management systems (VMS) are cornerstones of enterprise security, but with the advent of IP cameras, they can also open up organizations to cybersecurity risks. Containerization may mitigate these risks.
Simply having a cybersecurity incident response plan is no longer enough to protect organizations. Further build organizational resilience and readiness with tabletop exercises.