Making Sense of the Security Sensor Landscape
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors. Continue reading Making Sense of the Security Sensor Landscape
Collaborate Disseminate
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors. Continue reading Making Sense of the Security Sensor Landscape
Threatpost’s latest poll probes telehealth security risks and asks for IT cures. Continue reading Telehealth Poll: How Risky Are Remote Doctor Visits?
Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November’s election. Continue reading Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges
Survey says: exceedingly difficult.
But why?
The post Big Data Security Series Part 2: How Hard is it to Secure Big Data? appeared first on Security Boulevard.
Continue reading Big Data Security Series Part 2: How Hard is it to Secure Big Data?
I recently read an article by Michael Gale about digital transformation.
His book about the digital helix is pretty interesting too.
My immediate question was: is there a digital helix zone for cybersecurity?
The post Finding the Cybersecurity Swe… Continue reading Finding the Cybersecurity Sweetspot
Ferruh Mavituna is the Founder & Product Manager at Netsparker. Centralization vs. Decentralization of security is an interesting topic. Decentralization in web app penetration testing is popular in many large organizations because no good cent… Continue reading Centralization of Web Security, Netsparker – Enterprise Security Weekly #137
Businesses report the key advantages of moving workloads to the Cloud are flexibility, agility, easy access to information, and cost savings. Clearly they are taking use of these advantages, as seen in the 2018 State of the Cloud Survey performed by Ri… Continue reading Challenges of Enterprise Cloud Usage