Zero Trust Can’t Stop at the Federal Level
The federal government must step in to help local and state governments implement zero trust. Continue reading Zero Trust Can’t Stop at the Federal Level
Collaborate Disseminate
The federal government must step in to help local and state governments implement zero trust. Continue reading Zero Trust Can’t Stop at the Federal Level
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic. Continue reading DORA’s Global Reach and Why Enterprises Need to Prepare
Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. But it shouldn’t be your first course of action. Continue reading The Future of Cyber Insurance
Ransomware operators rely on cryptocurrency and other payment schemes to keep their activities under the radar and harder to trace. Continue reading Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware
Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target Continue reading Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm
Consistent acquisition of key technologies and talent is a proven strategy for growth. Continue reading 5 Reasons Why M&A Is the Engine Driving Cybersecurity
While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another. Continue reading Redefining the CISO-CIO Relationship
The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards. Continue reading IT/OT Convergence Is More Than a Catchy Phrase
Increased digitization makes strong cybersecurity more important than ever. Continue reading 7 Predictions for Global Energy Cybersecurity in 2022
There is a feature in the ASP.NET Core, that allows you to store sensitive configuration keys in the Azure Key Vault as Secrets.
However, I can’t see any attack scenario, in which this will help to protect my configuration values.
If my se… Continue reading Why I need to store my ASP.NET service configuration in Azure Key Vault