Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What Public Sector CISOs Should Take Away from Verizon's 2019 DBIR

It’s been a few weeks since Verizon released the 12th edition of its Data Breach Investigations Report (DBIR). For this publication, Verizon’s researchers studied 41,686 security incidents in which a response was necessary. These analysts found that 2,013 of those incidents were data breaches in that some sort of information was actually compromised.

What are Appropriate Authentication, Authorization, and Access Control Technologies?

Authentication, authorization and access control are three paramount cyber security concepts that are often confused and used interchangeably. It might be because these three are usually perceived as one single process by the end user, yet it is critically important to understand the distinction while designing the security framework.

What is Ransomware?

Since the first documented ransomware attack occurred in the late 80s, the attack method has increasingly become a threat to organizations and individual consumers. One cybercriminal may lock up a family’s computer and hold their precious photo memories hostage with the threat of deleting them. Another may cripple a business by locking up their primary revenue generating application database, costing the company millions of dollars in lost sales by the minute.

YouTube Attacks to Watch Out For in 2019

YouTube, the world’s top provider of streaming multimedia content, keeps reaching new heights in terms of its popularity. Nearly two billion monthly users and five billion videos watched every single day – these impressive statistics speak for themselves, and the numbers are steadily growing year over year. Everybody loves YouTube and so do cybercriminals, only in their very own nefarious way.

Containerized Air Gapped Edge Platform Architecture

An emerging use case for containerized platforms has been the ability to deploy applications in what is termed as an air-gapped deployment. This deployment pattern is particularly pronounced around edge computing (more on that later in the blog series) – though there exist significant differences between edge clusters and air-gapped deployments. Air-gapped applications are those that run isolated from datacenter or internet connectivity.

6 Useful Tips for Becoming an Active Listener

The author G.K. Chesterton noted that “there is a lot of difference between listening and hearing.” Of the four communication skills – listening, speaking, reading and writing – we learn listening first, but as time goes on many of us seem to lose interest in truly listening to what others have to say. Leaders would do well to work on listening to inspire workers and increase productivity.

Vulnerability scanning - in house or third party?

You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can help you stay one step ahead of the bad guys.

Steps for Successful Vulnerability Management: Lessons from the Pitch

When I was younger, I played a variety of team sports and enjoyed competing against opponents with my teammates. Winning was always a matter of applying sound tactics and strategy, attacking and defending well and using a blend of skill, talent and luck. Now that I’m older, I watch more than I play, and I’m able to appreciate the many lessons team sports teach, especially at the professional level. With sports, we can tackle technical topics in a relatable way.

How to Ensure Physical Security of Your Company's IT Infrastructure?

Physical security includes measures and precautions designed to guarantee the physical protection of IT assets such as facilities, equipment and other properties from damage and unauthorized physical access. Physical security aims to protect such assets from physical threats like theft, manmade catastrophes, accidental damage, fire and other natural disasters. It is an essential part of a security plan and is an indispensable component of all security efforts.