Remove Firewall Remove Fractional CTO Remove Malware Remove Report
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

There should also be a mechanism to report any violations to the policy. How incidents are reported and investigated. Firewall Policy. How firewalls are named, configured etc. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Wireless Policy. Backup Policy.

Policies 268
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Evaluating Commercial Cloud Services for Government – A Progress Report. Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Evaluating Commercial Cloud Services for Government – A Progress Report. Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

Silas Cutler, Principal Reverse Engineer at security firm Stairwell, authored a report detailing Maui and what his team uncovered about the lesser-known ransomware variant. The report was published on June 7, 2022. All identified copies of Maui (as of this report) have shared a compilation timestamp of 15 April 2021 04:36:00 UTC.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

So, investigators and reporters had a name. So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. Let's analyze malware. In this case, the alleged leaker was prolific on social media.