The Latest in IT Security

Posts Tagged ‘Automation’

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is offering guidance for advancing the vulnerability management ecosystem. In a November 10th blog post, Eric Goldstein, CISA Executive Assistant Director for Cybersecurity, outlines a three-step approach that organizations of any size can take to continue to make progress in efforts to thwart adversaries. They are: 1. […]

Read more ...

The Ransomware Spotlight Year-End Report from Ivanti, conducted in partnership with Cyber Security Works and Cyware, found that there is now a total of 157 ransomware families – an increase of 32 from the previous year. Targeting unpatched vulnerabilities and weaponizing zero-day vulnerabilities in record time allows ransomware families to inflict debilitating attacks. They are […]

Read more ...

In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening identity strategies. After a year of major cyberattacks, it’s clear that identity and access management still needs strategic changes. Where have organizations gone wrong? One of the biggest […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments