Remove Firewall Remove Fractional CTO Remove Malware Remove Research
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Ideally it should be the case that an analyst will research and write policies specific to the organization. Firewall Policy. How firewalls are named, configured etc. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. How access to the physical area is obtained.

Policies 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The Stairwell research team says that Maui "stood out" because it lacked some basic components commonly seen in other ransomware strains. It is because of this that researchers think Maui is manually operated, meaning the threat actor(s) is specifically choosing what files to encrypt and then exfiltrating the results.