Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Autonomous cars: Data will drive the future

You might have not noticed it, but we are on the verge of a disruptive change in the way we humans transport ourselves. In the next five to ten years the way we think about – and take – our daily commute, our holiday vacation, trips to the market – anything that involves transport over a distance too great to walk – will dramatically change.

Questions You Should Ask Your Cloud-Based Log Management Service Provider

The log management service is often outsourced to a third-party service provider due to the complexity of the process involved in the collection of logs. When a business plans for outsourcing log management to a service provider, business requirements must be given a top-most priority. To start with, a business must identify the goals it desires to accomplish through log management. After locating the required resources, the decision-making body should select a vendor for availing its services.

Got Container Security? Make Sure to Secure Code and Supplemental Components

Organizations face numerous primary threats and security concerns when it comes to their container environments. Those issues extend into their build environment, an area which organizations need to protect because it’s usually the least secure aspect of their container infrastructure. They also extend into other areas, including inside the containers themselves.

Geneva Information Security Day 2018 Spring Edition

Geneva Information Security Day (GISD) is a leading European cybersecurity conference created as a vendor-independent platform for open and actionable discussion of emerging digital threats and remedies, knowledge sharing and building sustainable cybersecurity industry. Join global senior executives at a series of panel discussions and networking sessions where you can share knowledge, best practice and thought in a confidential environment.

Why Is Logging Ecosystem So Important?

The logging ecosystem or a logging infrastructure is the set of all components and parts that work together to generate, filter, normalize, and store log messages. The purpose of this logging system is to use logs for solving particular problems. For example, the logs can help to find out the source of the attack. This article defines each component of logging ecosystem and illustrates how they work.

Threats from within

Cyber security is a big deal these days. A very big deal. A deal worth £3.5billion to be precise. The threats are varied and numerous, with attackers constantly shifting their methods and approach to circumvent security. No matter how good cyber security gets and how thorough your processes are, the threat will always remain. What’s interesting here is that a large portion of this threat comes from within your own walls.