APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Skills & Training | Strategy & Architecture | June 8, 2018 Reinventing and Scaling the SOC with AI: Helping Humans, Not Replacing Them By Alan Zeichick, Tech Editor, NetEvents When it comes to cybersecurity, there are no rules. You can’t write rules that… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Network Security | Next Gen Tech | Skills & Training | June 8, 2018 Server Virtualization Security: NIST Publishes SP 800-125A Revision 1 NIST has published Special Publication 800-125A Revision 1, Security Recommendations for Server-based Hypervisor Platforms. The revision adds security recommendations for… Read More APP-ACSM | CyberTech Verticals | Featured | Next Gen Tech | Skills & Training | Strategy & Architecture | June 5, 2018 Report to the President: Growing and Sustaining the Cybersecurity Workforce The Department of Commerce and Department of Homeland Security Secretaries publicly released their report to the President, Supporting the Growth and… Read More APP-ACSM | CyberTech Verticals | End-Point Security | Information Security | Network Security | Next Gen Tech | June 5, 2018 Fujitsu releases Protected Cloud, a SaaS offering, for Australian government agencies in partnership with Vault Systems News facts: Fujitsu Protected Cloud SaaS solution aimed at government agencies to enable digital transformation in a trusted and secure… Read More APP-ACSM | CyberTech Verticals | Information Security | Next Gen Tech | Strategy & Architecture | White Papers & Research | June 1, 2018 NIST Releases Draft White Paper Describing a Block Matrix Data Structure NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Network Security | Next Gen Tech | Skills & Training | June 8, 2018 Server Virtualization Security: NIST Publishes SP 800-125A Revision 1 NIST has published Special Publication 800-125A Revision 1, Security Recommendations for Server-based Hypervisor Platforms. The revision adds security recommendations for… Read More APP-ACSM | CyberTech Verticals | Featured | Next Gen Tech | Skills & Training | Strategy & Architecture | June 5, 2018 Report to the President: Growing and Sustaining the Cybersecurity Workforce The Department of Commerce and Department of Homeland Security Secretaries publicly released their report to the President, Supporting the Growth and… Read More APP-ACSM | CyberTech Verticals | End-Point Security | Information Security | Network Security | Next Gen Tech | June 5, 2018 Fujitsu releases Protected Cloud, a SaaS offering, for Australian government agencies in partnership with Vault Systems News facts: Fujitsu Protected Cloud SaaS solution aimed at government agencies to enable digital transformation in a trusted and secure… Read More APP-ACSM | CyberTech Verticals | Information Security | Next Gen Tech | Strategy & Architecture | White Papers & Research | June 1, 2018 NIST Releases Draft White Paper Describing a Block Matrix Data Structure NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APP-ACSM | CyberTech Verticals | Featured | Next Gen Tech | Skills & Training | Strategy & Architecture | June 5, 2018 Report to the President: Growing and Sustaining the Cybersecurity Workforce The Department of Commerce and Department of Homeland Security Secretaries publicly released their report to the President, Supporting the Growth and… Read More APP-ACSM | CyberTech Verticals | End-Point Security | Information Security | Network Security | Next Gen Tech | June 5, 2018 Fujitsu releases Protected Cloud, a SaaS offering, for Australian government agencies in partnership with Vault Systems News facts: Fujitsu Protected Cloud SaaS solution aimed at government agencies to enable digital transformation in a trusted and secure… Read More APP-ACSM | CyberTech Verticals | Information Security | Next Gen Tech | Strategy & Architecture | White Papers & Research | June 1, 2018 NIST Releases Draft White Paper Describing a Block Matrix Data Structure NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APP-ACSM | CyberTech Verticals | End-Point Security | Information Security | Network Security | Next Gen Tech | June 5, 2018 Fujitsu releases Protected Cloud, a SaaS offering, for Australian government agencies in partnership with Vault Systems News facts: Fujitsu Protected Cloud SaaS solution aimed at government agencies to enable digital transformation in a trusted and secure… Read More APP-ACSM | CyberTech Verticals | Information Security | Next Gen Tech | Strategy & Architecture | White Papers & Research | June 1, 2018 NIST Releases Draft White Paper Describing a Block Matrix Data Structure NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APP-ACSM | CyberTech Verticals | Information Security | Next Gen Tech | Strategy & Architecture | White Papers & Research | June 1, 2018 NIST Releases Draft White Paper Describing a Block Matrix Data Structure NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
CyberTech Verticals | Editor's Desk | Events | Featured | Governance, Risk & Compliance | Next Gen Tech | Skills & Training | Strategy & Architecture | Uncategorized | Vulnerabilities | Women in CyberSecurity | May 27, 2018 Episode 70 – Optimisation paradigms for AI and protocols for the point of Singularity – Liesl Yearsley, akin.com It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder… Read More APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APP-ACSM | CyberTech Verticals | Governance, Risk & Compliance | Information Security | Next Gen Tech | Vulnerabilities | May 25, 2018 New VPNFilter malware targets at least 500K networking devices worldwide INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More Previous 1 … 22 23 24 25 26 … 29 Next