Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report

If you compare two companies that are similar in all of the key ways – size, industry, revenue – what…
The post Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report appeared first on Siemplify.
The pos… Continue reading Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report

Computers and Video Surveillance

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different screens, scanning for something interesting. In either case, the video w… Continue reading Computers and Video Surveillance

Computers and Video Surveillance

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different screens, scanning for something interesting. In either case, the video was only stored for a few days because storage was expensive. Increasingly, none of that is true. Recent… Continue reading Computers and Video Surveillance

Video Surveillance by Computer

The ACLU’s Jay Stanley has just published a fantastic report: "The Dawn of Robot Surveillance" (blog post here) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society. I’m not going to excerpt a piece, because you really need to read the whole thing…. Continue reading Video Surveillance by Computer

The Human Cost of Cyberattacks

The International Committee of the Red Cross has just published a report: "The Potential Human Cost of Cyber-Operations." It’s the result of an "ICRC Expert Meeting" from last year, but was published this week. Here’s a shorter blog post if you don’t want to read the whole thing. And commentary by one of the authors…. Continue reading The Human Cost of Cyberattacks

New Gartner Report Made Available by CyberArk: Best Practices for Privileged Access Management Through the Four Pillars of PAM

Security and risk management leaders recognize that disruption begins with privileged access, since it allows external attackers and malicious insiders to control organization resources, disable security systems and access vast amounts of sensitive dat… Continue reading New Gartner Report Made Available by CyberArk: Best Practices for Privileged Access Management Through the Four Pillars of PAM

GitHub Repositories Leak Thousands of Secrets, Study Shows

In case you were ever in doubt about how well users are protecting credentials in GitHub repositories and other code repositories, researchers at North Carolina State University recently discovered many thousands of leaked secrets and…
The post GitHu… Continue reading GitHub Repositories Leak Thousands of Secrets, Study Shows