Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | TechTime | Women in Security | November 9, 2022 Convergence of Data & Security We speak with Ajay Sabhlok, to Chief Information Officer and Chief Data Officer and John Murphy, Global Field Chief Security… Read More
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | TechTime | November 8, 2022 Global cybersecurity membership services Interview with Rowland Johnson, President, CREST International, Rowland focuses on driving initiatives to increase engagement across the 300+ CREST members… Read More
Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | IT solutions | November 3, 2022 Top 10 Cybersecurity Predictions for 2023 BeyondTrust today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections are based on shifts in… Read More
Awards Awards | Editor's Desk | Events | Featured | Women in Security | October 26, 2022 Cyber Outstanding Security Performance Awards Finalists The international judging panel has reviewed the many Cyber OSPA nominations received from around the world and the list of… Read More
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | October 24, 2022 Cybersecurity for Business – Cyber Risk is not just an IT issue We speak with Larry Clinton, author of Cybersecurity for Business. Larry is the president of the Internet Security Alliance. He… Read More
Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | IT solutions | October 18, 2022 10 Ways to Protect your Family Against Cybercrime According to Scamwatch, Australian cyber-crime and scams cost us $56 million last year – and despite our best efforts, cyber… Read More
Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | IT solutions | October 12, 2022 Riskiest Connected Devices in Enterprise Networks Forescout’s Vedere Labs today unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks. The research, The… Read More
Editor's Desk Editor's Desk | Featured | Miscellaneous | vulnerabilities | October 12, 2022 The Race to Native Code Execution in PLCs Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys Written by Team82. Close to 10 years ago, Siemens introduced… Read More
Editor's Desk Editor's Desk | Featured | TechTime | October 12, 2022 Why Continuous Context Is the Only Way to Secure Complex Cloud Environments By Richard Davies, Director AN/Z at Lacework. The cloud is just as complex as it is amazing. The major cloud… Read More
Editor's Desk Editor's Desk | Featured | IT solutions | September 29, 2022 Zero Trust: Past, Present and a Call to Action for the Future By Dave Russell, Vice President of Enterprise Strategy, Veeam and Rick Vanover, Senior Director of Product Strategy, Veeam. A recent… Read More