Cybersecurity at a crossroads: Time to shift to an architectural approach

The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market. by Jon Oltsik Contributing Writer According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that things are about the same. When asked why they felt this way, security pros pointed to a growing attack surface, […]

read more

Cyber Attack Trends: Global Identity Crisis

Jeff Crume’s presentation titled “Cyber Attack Trends: Global Identity Crisis” likely delves into the current landscape of cyber attacks and their trends, particularly focusing on identity-related issues. Crume might discuss the rising threat of cyber attacks globally, highlighting how attackers exploit identity vulnerabilities to breach systems and networks. He may cover various attack techniques and tactics used by cybercriminals to compromise identities, such as phishing, social engineering, and credential theft. […]

read more

Microsoft’s Security Chickens Have Come Home to Roost

By Ryan Naraine: News analysis:  SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China’s audacious Microsoft’s Exchange Online hack and isn’t at all surprised by the findings. The US government’s public documentation of Microsoft’s shoddy cybersecurity practices, lax corporate culture and untruthfulness in public communications should come as no surprise to anyone.  There were dark patterns everywhere. For years, we collectively groaned and rolled our eyes as Microsoft shipped faulty and incomplete patches, gutted […]

read more

NSA shares zero-trust guidance to limit adversaries on the network

By Ionut Ilascu The National Security Agency is sharing new guidance to help organizations limit an adversary’s movement on the internal network by adopting zero-trust framework principles. A zero-trust security architecture requires strict controls for accessing resources on the network, be they inside or outside the physical perimeter, to minimize the impact of a breach. Top StoriesREAD MOREThe Week in Ransomware – March 8th 2024 -Waiting for the BlackCat rebrand […]

read more

Cloud CISO Perspectives: Executive lessons from our response to Reptar

Phil Venables VP, TI Security & CISO, Google Cloud Yousif Hussin Cybersecurity expert Welcome to the second Cloud CISO Perspectives for January 2024. In this edition, I’m turning the mic over to Yousif Hussin, who as a member of Google’s Vulnerability Coordination Center led our response to the recent serious zero-day CPU vulnerability Reptar. He talks about what important lessons executives can learn from how Google responds to critical zero-day […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights