Cybersecurity at a crossroads: Time to shift to an architectural approach

The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market. by Jon Oltsik Contributing Writer According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that […]

read more

Microsoft’s Security Chickens Have Come Home to Roost

By Ryan Naraine: News analysis:  SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China’s audacious Microsoft’s Exchange Online hack and isn’t at all surprised by the findings. The US government’s public documentation of Microsoft’s shoddy cybersecurity practices, lax corporate culture and untruthfulness in public communications should come as no […]

read more

NSA Releases Top Ten Best Practices For Cloud Environments

  ByTushar Subhra Dutta: Threat actors aim at Cloud environments because of their wide acceptance and one-stop storage of important information. Exploiting shortcomings in cloud security may enable unauthorized access to sensitive data, interruptions in infrastructure, or earning money. The fact that the systems are highly scalable and interconnected makes them […]

read more

NSA shares zero-trust guidance to limit adversaries on the network

By Ionut Ilascu The National Security Agency is sharing new guidance to help organizations limit an adversary’s movement on the internal network by adopting zero-trust framework principles. A zero-trust security architecture requires strict controls for accessing resources on the network, be they inside or outside the physical perimeter, to minimize […]

read more

Cloud CISO Perspectives: Executive lessons from our response to Reptar

Phil Venables VP, TI Security & CISO, Google Cloud Yousif Hussin Cybersecurity expert Welcome to the second Cloud CISO Perspectives for January 2024. In this edition, I’m turning the mic over to Yousif Hussin, who as a member of Google’s Vulnerability Coordination Center led our response to the recent serious […]

read more
Trustpilot
Verified by MonsterInsights