Breach disclosure has recently been in the news, and not necessarily in a good…
security
-
-
Employee use of unsanctioned hardware and software is an increasingly acute problem in the…
-
There are various ways a departing employee could put your organization at risk of…
-
Cloud SecuritySecurity
Google forms Cybersecurity Action Team to support customer security transformation
by Michael Hillby Michael HillGoogle has announced the formation of a cybersecurity action team to provide support to…
-
AT&T has launched a cloud-based, managed XDR (extended detection and response) offering designed to…
-
No company wants to see its crown jewels exposed to the elements, yet this…
-
Marketing technology, or ‘martech’, keeps getting more complex and more vital to the way…
-
Cloud SecuritySecurity
CISA’s Cloud Security Technical Reference Architecture: Where it succeeds and where it falls short
by Chris Hughesby Chris HughesPresident Biden’s Executive Order 14028 “Improving the Nation’s Cybersecurity” directed the Cybersecurity and Infrastructure…
-
Application programming interfaces (APIs) are a critical part of most modern programs and applications.…
-
As companies move more and more of their infrastructure to the cloud, they’re forced…