5 Examples of the Best Workplace Tech Available in 2018

CTOvision

Advice CTO Cyber Security NewsOver the past decade, the concept of work has transformed. From coworking spaces to remote work retreats, productivity in the workplace is no longer dependent on sitting in an office for eight hours a day, seven days a week. One of the biggest outcomes from this shift has been the rapid development of technology that […].

Another Great Example Of Pattern Analysis Over Hacker Activity

CTOvision

Big Data Cyber SecurityRecorded Future has just posted another nice piece of analysis on the cyber threat. This one in particular deals with interesting patterns which can be observed in hacker forums. Summary of the analysis: Forums can be analyzed at traffic level, without an analyst knowing foreign languages or tracking individual posts. Analysts can detect patterns in timing, forum participant product and vulnerability, etc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. Security

Trends 311

How Security and Risk Leaders Can Prepare for Reduced Budgets

CEB IT

In the wake of a global pandemic, a CIO of a large tech firm asked the chief information security officer (CISO) to reduce spend by 10%. Read more: 7 Security Areas to Focus on During COVID-19. Cost savings within security/IT. Joint business and security cost savings.

Budget 234

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

Security Experts Must Connect Cybersecurity to Business Outcomes

CEB IT

“The stories that we’ve seen during the COVID-19 outbreak are the latest example highlighting the failed approach to cybersecurity that many organizations take,” says Paul Proctor , Distinguished VP Analyst, Gartner. Read more: 7 Security Areas to Focus on During COVID-19.

Verisign: Security Services

CTOvision

This feat alone requires world class best technology design, operation, maintenance and security skills. Verisign provides services and technology capabilities to enterprises including Managed DNS, Recursive DNS, DDoS protection and security threat intelligence offerings.

Is Tik Tok a Security Threat?

SecureWorld News

In a recent email to Reuters , Tik Tok, an app which isn't even available in China, defended its stance on privacy and security: “We have no higher priority than promoting a safe and secure app experience for our users. and India aren't the only nations questioning Tik Tok's security.

Explosion of IoT in Consumer Electronics: 6 Real-World Examples

Perficient - Digital Transformation

IoT examples present in today’s consumer electronics are only the beginning. Going back to the household chores example, IoT will not only be valuable for offloading household chores, but it will also integrate with cognitive technologies to predict what the homeowner needs and begin scheduling their own routines. Additional examples include: Smart refrigerators/pantries that use weight-based sensors and re-order food items.

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

CTOvision

Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

Fountainhead: A Community Cloud: Real-World Example

Fountainhead

A Community Cloud: Real-World Example. For example, most clients will tend to use a common set of "Big Data" - ranging in size from Terabytes to Petabytes. What does this example say to me? A Community Cloud: Real-World Example. skip to main | skip to sidebar.

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

These are examples of consumer-oriented sensors and devices, but that has occurred in parallel with business, professional, infrastructure, government and military applications. Here are some examples…. With these burgeoning capabilities, there needs to be some focus on cyber security.

Securing Smart Home Ecosystems

Galido

Information Technology Blog - - Securing Smart Home Ecosystems - Information Technology Blog. Even if your Alexa orders your groceries and makes your ice, you still need to sort out your own home security. Connected smart home devices present real security risks.

Dedrone: Leading provider in airspace security

CTOvision

Dedrone is the leading provider in airspace security. They are attracting lots of attention in the security community, as well as from investors. They are one of the portfolio of JC2 Ventures, for example. Company Robotics Companies Security Companies

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! As you try to simplify the user experience and reduce friction, the cost for security goes up. Can we overcome the friction of security?

A Flicker Of Light: A new security stack points the path to safety

CTOvision

Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Examples of Two-Factor Authentication & Why They Matter

ITGCT

This technology improves security for both businesses and consumers. Not only does it enhance security, but it also provides you with better peace of mind. In addition, implementing two-factor authentication is a cost-effective security measure. Examples of Two-Factor Authentication. Some of the most common examples of two-factor authentication include: Banks – Most banks now have two-factor authentication available to their customers.

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. The topic of the special focus area Sean is helping edit is "Bio-Inspired Cyber Security and Networking.". Adaptation algorithms for cyber security & networking.

Quantum Cyber-Security with QuintessenceLabs

CTOvision

With about 100,000 successful attempts , thousands of taxpayers anxiously awaiting news of whether thieves accessed their personal and financial information, many thought the federal security situation was so poor it would be hard to get worse. These and many other attacks are shifting the collective enterprise mindset around security, especially around encryption. In the IRS example, the exploitation of taxpayer information could have been thwarted with enhanced encryption.

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. Six Tips for Upgrading Your Wireless Security.

Machine Learning Is Transforming Data Security

Eric D. Brown

Data is the lifeblood of any organization today so it should be easy to understand that security of that data is just as important (if not more important) that the data itself. It seems that data security (or rather the lack thereof) has been in the news regularly over the last few years.

Simplifying The Overwhelming Cyber Security World For Boards of Directors

CTOvision

For example, see our post titled Cyber Security and Corporate Governance: The five principles every corporate director should embody. Another source of insight we like is the Security and Exchange Commission. Analysis CTO Cyber Security Treasury Board of directors NACD

Why a Reactive Security Strategy Costs Companies Millions Each Year

CTOvision

With each new threat, digital security companies are learning to react more quickly and put out countermeasures for these malicious programs, but in the time between a piece of malware’s release into the wild and the release of the solution, it can cost companies a staggering amount of money.

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Information security staff play a critical role in resolving all these problems. Document “tribal knowledge” to improve security’s response : Fast, effective responses to cyber crises require a lot of detailed knowledge, much of which resides with individuals on the information security team.

Leverage Bot Management To Enforce Ethical Data Use

Forrester IT

For examples of good bots, consider search […]. application security data mining and collection privacy security & risk Security & Risk

Data 247

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

CTOvision

The title of his talk is "Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices.". You will find them here (for example, listen for his use of the term "above the waterline"). Bob Gourley.

System 317

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

Hadoop Security: Protecting Your Big Data Platform is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts. Title: Hadoop Security. Security is typically the longest phase of any Hadoop project.

How to Secure Your Windows PC

Galido

Information Technology Blog - - How to Secure Your Windows PC - Information Technology Blog. With the increasing threat to cybersecurity, it becomes necessary for a user to place all preventive measures to avoid damage to data security. Best ways to secure your Windows PC.

Threema, the Seriously Secure Messaging Application: Check It Out!

CTOvision

If you’ve ever been worried that the messages you are sending your friends and co-workers via the normal texting applications were not secure enough and you felt unsafe giving out personal information, then Threema might be the application for you to use. By May Gourley.

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. By Katie Kennedy.

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

All kinds of corporate functions, for example – from finance to procurement teams – will ask line partners to help them with a risk assessment. Blog Corporate Data and Information Security Customer Data and Information Security Information Risk Information Technology

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

When David Sherry became Chief Information Security Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. I wanted to make security both cultural and programmatic.".

Examples of Two-Factor Authentication & Why They Matter

ITGCT

This technology improves security for both businesses and consumers. Not only does it enhance security, but it also provides you with better peace of mind. In addition, implementing two-factor authentication is a cost-effective security measure. Examples of Two-Factor Authentication. Some of the most common examples of two-factor authentication include: Banks – Most banks now have two-factor authentication available to their customers.

Determining Who Should Be in Charge of Cyber Security

CTOvision

Security has quickly transformed into a major issue for most businesses. As headlines highlight the now common incidents of security breaches, where victims as large as Target, JPMorgan Chase, and Sony have to struggle to repair the damage, many companies are prioritizing their cyber security needs, hoping to avoid becoming the next victim of a hacker’s wrath. Of course, it’s easy to say that security problems need to be addressed quickly.

Security Awareness Training | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to the blog series dedicated to helping you secure your infrastructure in 2019. You’re here, that means you’re interested in what you can do to better secure your environment and that’s awesome! The risk of not providing security awareness training.

Strategies for Securing Nonprofit Networks

Doctor Chaos

For example, they often don’t […]. Nonprofits often think about how to attract more volunteers or achieve a greater reach with their fundraising initiatives. However, getting targeted by cybercriminals is a possibility that may not come up for discussion.

HawkEye-G: Addressing key enterprise security technology needs

CTOvision

With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. Many other best practices exist for different domains of industry, for example, the credit card industry enforces PCI guidance. Most enterprises now use a collection of enterprise security capabilities to help execute on their defense in depth strategies and they provide capabilities for the controls mentioned above. By Bob Gourley.

Watch My Friend Become My Hero: Cyber Security Champion and Lawyer Jody Westby Does Right Thing at Right Time

CTOvision

If you have worked at the nexus of cyber security and policy you no doubt know Jody Westby. Analysis Big Data CTO Cyber Security DoD and IC Forbes Jody Westby

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. They should base their campaigns on the six root causes that are most likely to motivate employees to behave securely or not.

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Cloudera continued to focus on security and find-grain access control with capabilities like Sentry. Cloudera Strengthens Hadoop Security with Acquisition of Gazzang. By Bob Gourley.

7 IT Security Risks for Small Businesses

Galido

Information Technology Blog - - 7 IT Security Risks for Small Businesses - Information Technology Blog. Here are top IT security risks you should avoid or manage before they take your business down. Or do you take security for a granted just because you don’t have a huge volume of data?