article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

article thumbnail

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality. But if a user accidentally deletes their keys and have not made a hard copy backup they will be lost. This is similar to real cash.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

Instead of encrypting backup data, BlackMatter instead wipes it clean in some cases. Rather than encrypting backup systems, BlackMatter actors wipe or reformat backup data stores and appliances. Backup your data and put procedures in place for restoration. DarkSide made claims it was shutting down earlier this year.

Backup 82
article thumbnail

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

SecureWorld News

million assets across its enterprise customer base, including a number of Fortune 500 companies. The typical global enterprise has over 12,000 web apps, which include APIs, SaaS applications, servers, and databases, among others. Regular Backups: Regularly backup PII and other essential data.

Mobile 93
article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Most commercial enterprise software products and nearly all open-source ones depend upon numerous software packages and libraries.

Trends 125
article thumbnail

How Advances in Cloud Security Can Help with Ransomware

CIO Business Intelligence

Another out-of-date belief is that frequent backups are the best recovery strategy. While that may be true for less capable attacks, an attacker that is already inside a network not only has the opportunity to compromise backups, but also exfiltrate (and ultimately leak) critical data. Close back doors.

Security 104
article thumbnail

Five areas where EA matters more than ever

CIO Business Intelligence

The discipline of enterprise architecture (EA) is often criticized for forcing technology choices on business users or producing software analyses no one uses. Forrester Research has identified more than 20 types of enterprise architecture roles being used by its clients. You need an ecosystem of subject-matter experts.

CTO Hire 120