Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Every business and industry are unique. Take finance, for example, who are in the business of managing money. How do the finance industry’s IAM priorities differ from an IT organization, who is in the business of selling technology?
Download the eBook to learn:
The main IAM challenges and priorities for...
The Home Depot reached a $17.5 million settlement of a multistate lawsuit stemming from a 2014 data breach that compromised the payment card data of 40 million customers. The company will also implement new security procedures as part of the agreement.
Last week, fraudsters targeted two cryptocurrency platforms by accessing domains managed by GoDaddy, according to notices published by the victimized firms. The domain register company previously has had issues with unauthorized access.
A U.S. unit of Italian-based eyewear maker and eye care center conglomerate Luxottica has reported a breach affecting over 829,000 individuals - the fourth largest health data breach added to the U.S. federal tally so far this year. It's unclear if a recent ransomware attack is related.
A recently uncovered vulnerability in a class of Amazon Web Service APIs can be exploited to leak AWS identity and access management user and arbitrary accounts, according to Palo Alto Networks' Unit 42.
U.K. Prime Minister Boris Johnson announced Thursday the creation of a National Cyber Force designed to strengthen Britain's cybersecurity posture and give the country new defensive and offensive capabilities. Some security experts, however, are raising concerns about recruiting enough qualified staff members.
View this webinar, as we explore these topics and many more to outline how these architectures and aspirations lay the groundwork for a better user experience, increased reliability of your services, as well as increased security for all your web-facing business functions.
This edition of the ISMG Security Report features a discussion with Christopher Krebs, the recently fired director of the Cybersecurity Infrastructure Security Agency, on his accomplishments at the agency. Also featured are updates on ransomware gangs recruiting affiliates and healthcare supply chain risks.