Tag: Contributors
-
Microservices for IAM: container security and personal data
Identity and access management has become a bit of a beast. It has gone from a system that was contained within an enterprise – usually …
-
Shadow IT: it’s not what you think
I recently spoke to a crowd of professionals about “Shadow IT,” and I couldn’t stop picturing the “Shadow Monster” from …
-
6 steps for GDPR compliance
The General Data Protection Regulation (GDPR) is in the news these days — for good reason. This sweeping new law applies to all companies …
-
3 common cybersecurity maturity failings
Anton Chuvakin from Gartner recently blogged about the overall low maturity in cyber security. He made some interesting …
-
Repeat After Me… Nobody Is Safe From Cyber Attacks
Nobody Is Safe From Cyber Attacks The last couple of years have shown the world that seemingly nobody is safe from cyber attacks. The 2017 …
-
A day in the life of a MSSP engineer
Jordan has worked as the senior engineer at VirtualArmour since 2011. He is part of a Security Operations Center that oversees client sites …
-
Can AI eliminate phishing?
Phishing and social engineering schemes have been making headlines more than ever. From spear phishing to whaling to BEC (Business Email …
-
A look back at cybersecurity in 2017
The fact is no enterprise or individual is immune to a breach. What really matters is, did they have an intrusion but then prevent a data …
-
What midsize companies need to understand about cybersecurity threats
Understanding risk is the first step towards a strong cybersecurity posture. From ransomware to compromised passwords, midsize …
-
How to spend your cybersecurity budget increase
In “How to sell cybersecurity to your executive team,” I discussed strategies to sell cybersecurity to your board of directors, …
-
Inside story on HPC’s role in the Bridges Research Project at Pittsburgh Supercomputing Center
The next BriefingsDirect Voice of the Customer high-performance computing (HPC) success story interview examines how Pittsburgh …
-
Reading between the lines: the real impact of insider threat
Insider threat events can have a direct impact on the market value of a business. For example, when the arrest of former Booz Allen …
●●●