article thumbnail

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

Network World

With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as more important than the other. To read this article in full or to leave a comment, please click here

SDLC 65
article thumbnail

Cognitive on Cloud

Cloud Musings

If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L. Companies that are leveraging cloud today must also prepare for the cognitive computing era. This blend of cloud and cognitive has, in fact, created a brand new application development model. This post was brought to you by IBM Global Technology Services.

Cloud 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

ObserveIT enables security teams to detect a risky user activity, investigate incidents in minutes and effectively respond. He's from the Johns Hopkins University Information Security Institute and also my co-host on the "Hacking Humans" podcast. This 20 minute podcast is available for listening below.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

ObserveIT enables security teams to detect a risky user activity, investigate incidents in minutes and effectively respond. He's from the Johns Hopkins University Information Security Institute and also my co-host on the "Hacking Humans" podcast. This 20 minute podcast is available for listening below.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

ObserveIT enables security teams to detect a risky user activity, investigate incidents in minutes and effectively respond. He's from the Johns Hopkins University Information Security Institute and also my co-host on the "Hacking Humans" podcast. This 20 minute podcast is available for listening below.