Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.
Cybersecurity
As Chris Hughes explains in Ep. 18 of Cybersecurity Minute, Atlassian’s notification to the public of these vulnerabilities allowed companies to put mitigating controls in place until the patch was released.
Though it’s primarily for the EU, the sweeping privacy regulation will have a lasting impact outside of Europe in regulating data privacy.
In Cybersecurity Minute, Ep. 17, Chris recaps the highlights from the annual report including rises in ransomware and supply chain security attacks.
In Cybersecurity Minute, Ep 16, Chris provides an update on the 2015 Office of Personnel and Management data breach and subsequent settlement for 22 million users.
In the Data Revolution podcast premiere episode, Pablo hosts CEO Joseph Derflinger and CTO See Wan Toong to discuss their studio’s new game ‘Reign of Terror.’
Finding cyber talent is challenging enough, but the public sector’s national security and social services concerns make the hunt even harder.
In this Cybersecurity Minute, Chris analyzes how the digital infrastructure of Costa Rica is falling prey to cyber crime.
Although there are differences between the private and public sectors, there is also more overlap than we hear from social media conjecture.
From supply chain software to workforce changes, future cybersecurity trends require closer looks by companies looking to make their systems more resilient.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.
As more companies embrace a decentralized workforce, they must increase cybersecurity efforts for remote work environments.
Kubernetes opens up an attractive opportunity to do multi-cloud deployments in a way that doesn’t conjure up nightmares. Here are a few things to consider.
Chris addresses FBI, CISA, and NSA warnings that managed service providers that are also SMBs are increasingly popular targets for supply chain attacks.
As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.
We explore the reasons for its infamous rise. Regardless, organizations need to increase efforts to secure app access.
In this Cybersecurity Minute, Aaron looks at Oracle Cloud’s new security features and the use of machine learning in cloud data threat assessment.
Okera’s Bobby Napiltonia and Nong Li join Acceleration Economy analysts Wayne Sadin and Aaron Back to discuss data stewardship in a time of expanding regulations and compliance requirements.
As supply chain complexity has exploded, CISOs need to map out the risk management strategies for their organizations.