There's a rush to cloud services, and that can offer security benefits. But it can be difficult to keep track of data and classify it in the cloud, says Neil Campbell of Telstra, a telecommunications company.
Protecting customers and company resources in the cloud is a constant struggle and balancing act. Fraudsters are aided by new techniques and technologies while unknowing customers support their efforts. In this session, fraud prevention experts from Amazon Web Services will outline the compromise problem and discuss...
As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh.
Digital transformation is putting pressure on every organisational function - especially IT Security.
But how and why does digital assets provide great benefits? And why is collaboration key to securing a dynamic IT environment?
This eBook shares perspectives on how your peers are beginning their Cyber Exposure...
Real-world incidents prove over and over again that many of the most widespread issues still stem from a lack of basic cyber hygiene. This report looks at where organizations are falling on the basics and outlines steps for establishing a strong foundation for security.
Download this industry-leading report to...
Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.
What the world needs now is Integrity
Established as part of the CIA triad, Integrity's certainly not new cybersecurity vocabulary. But it's the least understood. Integrity is about maintaining a desired state. File Integrity Monitoring (FIM) is the clearest example, but it's important to extend Integrity more...
With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift. You may be struggling to figure out how to secure this new class of assets and the environments they reside in.
Download this comprehensive whitepaper for guidance on:
How to think beyond securing just...
Cloud-based CRM giant Salesforce.com is warning some of its Marketing Cloud users that any data they stored may have been accessed by third parties or inadvertently corrupted because of an API error that persisted for six weeks.
Web application firewalls (WAF) are a basic security necessity for every
organization. Oracle Dyn WAF covers all of your bases and more with this
cloud-based, advanced solution.
Factors such as the rise of cloud computing, use of open
source technologies, the increase in data processing requirements,...
Security leaders have been addressing the global skills gap for over a decade, with little to show for it.
However, a new approach - leveraging software as a service - is making up for the staffing shortfall.
The discussion really starts with software as a service. If you look at the benefits of leveraging the cloud...
Why are attacks so successful? Legacy endpoint security products are creating more problems than they solve. There is too much cost and complexity, defenses aren't keeping up, and security staff is stretched thin.
Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
Businesses undertaking digital transformation - typically involving a push to the cloud, amongst other initiatives - must put security first if they want their project to achieve optimum success, says Fortinet's Patrick Grillo.
The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic...