Microsoft Defender for Cloud Gets More Multicloud

With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure. Continue reading Microsoft Defender for Cloud Gets More Multicloud

CISO Roundtable: Ransomware Attacks and the True Cost to Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, inc… Continue reading CISO Roundtable: Ransomware Attacks and the True Cost to Business

Report: Ransomware Attacks and the True Cost to Business

Ransomware attacks have continued to make headlines, and for good reason: on average, there is a new ransomware attack every 11 seconds, and the losses to organizations from ransomware attacks is projected to reach $20 billion over the course of 2… Continue reading Report: Ransomware Attacks and the True Cost to Business

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business … Continue reading CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

Healthcare security today is extremely complex due to the integrated clinical systems and connected community networks. As well, no longer are the medical records stored with a single provider.
The post CISO Stories Podcast: Effective Health Care… Continue reading CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

The Kubernetes Network Security Effect

I’m a firm believer that network security must be a layer in an overall security strategy. As cloud evolves, it’s hard not to notice the network security challenges in this domain. TL;DR: Kubernetes (K8s) has a built-in object (sort of) fo… Continue reading The Kubernetes Network Security Effect

Visibility, Vulnerabilities and VPNs – Extending Your Corporate Security Policies and Procedures to Cover Remote Workers

We’ve heard a lot about the drastic measures that organizations in North America and Western Europe are taking to protect their employees against the coronavirus. But as we all know, COVID-19 is a global pandemic. Organizations all over the world… Continue reading Visibility, Vulnerabilities and VPNs – Extending Your Corporate Security Policies and Procedures to Cover Remote Workers

DEF CON 27, Cloud Village – Setu Parimi’s ‘PacBot Policy As Code From T-Mobile OSS’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Cloud Village – Setu Parimi’s ‘… Continue reading DEF CON 27, Cloud Village – Setu Parimi’s ‘PacBot Policy As Code From T-Mobile OSS’

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

The security industry has the perfect skillset and adversarial defense outlook to deal with some of the emerging societal issues in today’s world, said security technologist Bruce Schneier. Continue reading Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow