Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

SASE and the Forces Shaping Digital Transformation Part 1: Businesses Strategy and Information Technology Ops

At the convergence of digital transformation, an industry-wide focus on SASE, and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. This is the first blog in a series of three detailing these forces and how security leaders and practitioners can adapt to them in a digitally transforming, SASE-enabled world. This blog covers the forces of Business Strategy and Information Technology Operations.

What is eBPF and How Does it Work?

About a year ago, a friend of mine decided to build an EVM (Ethereum Virtual Machine) assembler in Rust. After some prodding from him, I began to help by writing unit tests. At the time, I knew very little about operating systems and started to read about lexical and symbolical analyzers. I was quickly in way over my head. What I did retain, however, was a newfound appreciation for the OS as a whole. So, when he started raving about eBPF, I knew I was in for a treat.

How to Write a Work From Home Policy (Free Template) | CurrentWare

The demand for remote work isn’t stopping anytime soon. Did you know that 77% of employees want to keep working from home after COVID-19? In this video CurrentWare’s managing director Neel Lukka tells you the things you MUST include in your work from home policy. To help you get started we’ve provided a work from home policy template that you can download and customize to fit the needs of your business.

Driving the Cybersecurity Agenda with the C-Suite and Boards

Veracode CEO Sam King joins the Advanced Cyber Security Center, the Boston Globe’s Jon Chesto, MassMutual CISO Jim Routh, and State Street CTRO for a fireside chat about the strategic role the C-suite and corporate boards play in cybersecurity. Sam describes why communication between the board, the C-suite, the CISO, and the security team must be frequent to add value from both a governance and compliance perspective.

The Need for Data Speed: The secret to how E Global secures the end-to-end customer experience

Interested in exploring how Mexico’s largest electronic payments processor consistently secures the end-to-end customer experience while processing more than 13 million credit and debit card transactions each day? We invite you to join Ander Murillo Zohn, Deputy Director of Big Data Technologies at E-Global, and Stacy Gorkoff, VP of Marketing and Channel Development at INETCO, for a 45-minute webinar as they discuss the secret to using real-time data to achieve the best customer experience possible.

The Importance of Data Classification for Data Loss Prevention

Data loss prevention (DLP) tools and processes help ensure that critical data is not accessed by or tampered with by unauthorized users. The underlying technology that can make or break your success in data loss prevention is data classification. This article explains how data classification affects the success of your data loss prevention measures.

Managing Compliance and Security in a Remote World

'Times they are a-changin' was a song performed by Bob Dylan many decades ago, but the words ring true now more than ever. The Covid-19 pandemic has had serious repercussions on the healthcare ecosystem and has shaken up the global economy. The pandemic has also forced millions to work remotely from their homes. According to analyst firm Gartner Inc., amid Covid-19, 88% of enterprises shifted to remote working for their employees.

Cyber security assurance levels in the automotive supply chain

With the ISO SAE 21434 standard for road vehicles coming soon, learn the role cyber security assurance levels play in your road vehicle safety program. Automotive cyber security standard ISO SAE 21434 specifies requirements for cyber security risk management of road vehicle electrical and electronic systems, including their components and interfaces. It covers engineering for concept, development, production, operation, maintenance, and decommissioning.

Six Reasons why Enterprise Digital Rights Management (EDRM) Matters for Data-Centric Security

The rapid proliferation of digital content and the increasing sophisticated cyberattacks has forced enterprises to resort to Enterprise Digital Rights Management (EDRM) to protect their important data and information. Insider attacks are one of the most serious cybersecurity threats. Among all insider attacks, information theft is considered the most damaging in terms of potential financial loss.