Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Driving the Cybersecurity Agenda with the C-Suite and Boards

Veracode CEO Sam King joins the Advanced Cyber Security Center, the Boston Globe’s Jon Chesto, MassMutual CISO Jim Routh, and State Street CTRO for a fireside chat about the strategic role the C-suite and corporate boards play in cybersecurity. Sam describes why communication between the board, the C-suite, the CISO, and the security team must be frequent to add value from both a governance and compliance perspective.

The Need for Data Speed: The secret to how E Global secures the end-to-end customer experience

Interested in exploring how Mexico’s largest electronic payments processor consistently secures the end-to-end customer experience while processing more than 13 million credit and debit card transactions each day? We invite you to join Ander Murillo Zohn, Deputy Director of Big Data Technologies at E-Global, and Stacy Gorkoff, VP of Marketing and Channel Development at INETCO, for a 45-minute webinar as they discuss the secret to using real-time data to achieve the best customer experience possible.

The Importance of Data Classification for Data Loss Prevention

Data loss prevention (DLP) tools and processes help ensure that critical data is not accessed by or tampered with by unauthorized users. The underlying technology that can make or break your success in data loss prevention is data classification. This article explains how data classification affects the success of your data loss prevention measures.

Managing Compliance and Security in a Remote World

'Times they are a-changin' was a song performed by Bob Dylan many decades ago, but the words ring true now more than ever. The Covid-19 pandemic has had serious repercussions on the healthcare ecosystem and has shaken up the global economy. The pandemic has also forced millions to work remotely from their homes. According to analyst firm Gartner Inc., amid Covid-19, 88% of enterprises shifted to remote working for their employees.

Cyber security assurance levels in the automotive supply chain

With the ISO SAE 21434 standard for road vehicles coming soon, learn the role cyber security assurance levels play in your road vehicle safety program. Automotive cyber security standard ISO SAE 21434 specifies requirements for cyber security risk management of road vehicle electrical and electronic systems, including their components and interfaces. It covers engineering for concept, development, production, operation, maintenance, and decommissioning.

Six Reasons why Enterprise Digital Rights Management (EDRM) Matters for Data-Centric Security

The rapid proliferation of digital content and the increasing sophisticated cyberattacks has forced enterprises to resort to Enterprise Digital Rights Management (EDRM) to protect their important data and information. Insider attacks are one of the most serious cybersecurity threats. Among all insider attacks, information theft is considered the most damaging in terms of potential financial loss.

What is network security? Network security technologies explained

The modern-day organization is under constant pressure to remain operational and profitable. Both of these pressures are put to the test by cybercriminals daily, who attempt to infiltrate, compromise, navigate, and ultimately act in a threatening manner that can have negative repercussions to productivity, ability to transact, customer privacy, brand reputation and bottom-line revenue.

Leaky Chats: Accidental Exposure and Malware in Discord Attachments

Did you know that Discord attachments are publicly accessible? Did you know that even after deleting an attachment, the link to download the file is still active? In this edition of our leaky app series, we cover how sharing attachment links in Discord can cause accidental public exposure of data. We will also look into the malware abuse case of threat actors using Discord as a malware-hosting platform.

Securing Office 365 Made Simple

Do you need to better secure your organisation, your employees and your data? Then start with Office 365. 365 is the backbone of your business (communications, sharing, storage) yet it exposes the largest risk surface. Securing 365 can be complex and time-consuming. Let us demystify it, get you secured easily and quickly, whilst saving time and money.