CISOs, AI, and OT: A Balancing Act Between Innovation and Protection
Blog Published: 05/03/2024
Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.In early 2024, I had the privilege of teaching a SANS leadership course in New Orleans. The food was amazing, as expected. What I didn't expect was the sheer number of operational technology (OT) security...
Post-Quantum Preparedness
Blog Published: 05/03/2024
Written by Ascertia.The world of cryptography is on the cusp of a significant change. Quantum computers, once thought of as mere science fiction, are rapidly becoming a reality. While widespread availability of these powerful machines might not be imminent, their potential to break current crypt...
Business Risks Explored: Practical Insights for Resilience
Blog Published: 05/03/2024
Written by the AuditCue Content Team. The COVID-19 pandemic serves as a prime example of external risks faced by companies, causing disruptions in supply chains, declines in demand, and government-mandated closures. However, some companies were able to adapt and innovate in response to the pan...
Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident
Blog Published: 05/02/2024
Originally published by Oasis Security.Written by Amit Zimerman, Co-founder & CPO, Oasis Security.Last week, the DHS Cyber Safety Review Board, established by President Biden, released a scathing report exposing critical oversights by Microsoft that enabled the targeted cyberattack by Chinese...
Microsoft Copilot for Security: Everything You Need to Know
Blog Published: 05/02/2024
Originally published by Reco.Written by Gal Nakash.What is Microsoft Copilot for Security?Microsoft Copilot for Security is an innovative component of the Microsoft security product portfolio. It is essentially engineered to redefine the management of security incidents. This solution is deeply ...
Defining Cloud Key Management: 7 Essential Terms
Blog Published: 05/01/2024
In the realm of cloud security, understanding key management is paramount to safeguarding sensitive data. Encryption, key generation, and access control help ensure that sensitive information remains unreadable and inaccessible to unauthorized parties. Without a thorough understanding of cloud ke...
Livin' on the Edge: Linux's Impact on Computing
Blog Published: 05/01/2024
Originally published by Automox.SummaryThis episode of the CISO IT podcast explores the history and importance of Linux.Automox CISO Jason Kikta shares his personal experience with Linux and highlights its advantages and innovations. The conversation also touches on the changing attitudes towards...
Navigating the Cloud – Beyond “Best Practices”
Blog Published: 05/01/2024
Originally published by Cloud Computing Consultants.Cloud migrations are complex. Rapidly evolving technology, team culture changes, and changing architectural requirements leave companies seeking options to alleviate their cloud migration paths. As a result, businesses are bombarded with a slew ...
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
Blog Published: 04/30/2024
Originally published by Cyera.Healthcare organizations face rising cybersecurity threats looking to exfiltrate patient data. This article explores major healthcare data breaches, the value of stolen medical info, and how data security posture management (DSPM) solutions provide comprehensive data...
Considerations When Including AI Implementations in Penetration Testing
Blog Published: 04/30/2024
Originally published by Schellman.Did you recently implement a new artificial intelligence (AI) feature within your application and now your customers are starting to ask for AI-specific penetration tests? Are you curious as to how an assessment like that would work? As with all these exercises, ...
Your Ultimate Guide to Security Frameworks
Blog Published: 04/29/2024
Originally published by Vanta.Trust is a vital part of any growing business. A part of earning and keeping the trust of your customers is implementing the right security measures to protect their data and your systems from any breaches that could impact them. By aligning with industry-vetted secu...
Five Reasons Why Ransomware Still Reigns
Blog Published: 04/29/2024
Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Ransomware – malicious software that encrypts data until a ransom is paid for its return or is leaked without its owner's consent – remains a persistent threat despite ongoing efforts to combat it. Even w...
The Future of Cloud Cybersecurity
Blog Published: 04/29/2024
Written by Ashwin Chaudhary, CEO, Accedere.As we continue to embrace digital transformation, the future of cybersecurity in the cloud computing landscape is a topic of top importance. With an increasing number of businesses and individuals relying on cloud services, the need for robust and effect...
This Year’s Zero Trust Opportunity for Security Professionals
Blog Published: 04/26/2024
Written by Martin Hall. The world of Zero Trust is at the doorstep of security professionals, bringing the opportunity to add value to their tool belts and advance their careers and opportunities.Digital transformation is gathering pace. Organizations are increasing their use of cloud infrastruct...
DevSecOps Tools
Blog Published: 04/26/2024
Originally published by Dazz.Written by Noah Simon, Head of Product Marketing, Dazz.The goal of DevSecOps is to integrate security practices into the DevOps process. While much of the narrative of DevSecOps has been around writing ‘more secure code’, the narrative has expanded recently. Mature De...
CPPA AI Rules Cast Wide Net for Automated Decisionmaking Regulation
Blog Published: 04/26/2024
Originally published by Truyo. Written by Dan Clarke.At the end of 2023, the California Privacy Protection Agency (CPPA) unveiled draft regulations aimed at automated decision-making technology (ADMT), including artificial intelligence (AI), to bolster consumer protections in the state. This step...
Why Business Risk Should be Your Guiding North Star for Remediation
Blog Published: 04/25/2024
Originally published by Pentera.We all know the culprits. Cloud adoption, remote and hybrid work arrangements and a long list of must-have technologies have led to an ever-expanding attack surface, compelling organizations to become more agile and responsive in their cyber defense.Taming this unw...
Navigating the XZ Utils Vulnerability (CVE-2024-3094): A Comprehensive Guide
Blog Published: 04/25/2024
Originally published by Uptycs.On 29 March 2024, the cybersecurity community turned its attention to a newly disclosed vulnerability in XZ Utils, identified as CVE-2024-3094. This backdoor vulnerability has sent ripples across the tech world, primarily due to the widespread use of XZ Utils for lo...
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
Blog Published: 04/24/2024
Written by Martin Hall.As business reliance on cloud infrastructure has grown, attack surfaces have changed, vulnerabilities have increased, and the nature of threats continues to evolve. Zero Trust has become a pivotal framework to enhance the security of cloud infrastructure and services. Its f...
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity
Blog Published: 04/24/2024
Originally published by BARR Advisory. Written by Larry Kinkaid, Manager, Cybersecurity Consulting. When it comes to implementing and maintaining a strong cybersecurity posture within any organization, accountability is key. An information security program is only effective when controls—i.e., in...