Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read more

A week in security (July 22 – 28)

Credit to Author: Malwarebytes Labs| Date: Mon, 29 Jul 2019 15:50:58 +0000

The latest cybersecurity news for the week of July 22–28. We look at Phobos ransomware, stalkerware’s similarities to parental monitoring apps, and the investigation into Malaysian Airlines Flight 17.

Categories:

Tags:

(Read more…)

The post A week in security (July 22 – 28) appeared first on Malwarebytes Labs.

Read more

Utah County to pilot blockchain-based mobile voting

Credit to Author: Lucas Mearian| Date: Tue, 23 Jul 2019 10:46:00 -0700

Utah County is the latest government entity to pilot a mobile voting application based on blockchain to allow military absentee voters and their family members living overseas to vote in an upcoming municipal primary election.

The county, which has more than a half million residents, is the third in the U.S. to partner with Tusk Philanthropies on a national effort to expand mobile voting. The pilot is a collaboration between the Utah County Elections Division, Tusk Philanthropies, the National Cybersecurity Center and Boston-based voting app developer Voatz.

To read this article in full, please click here

Read more

New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service

Credit to Author: Trend Micro| Date: Wed, 17 Jul 2019 14:36:29 +0000

Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems. In a recent survey conducted by analyst firm ESG, 87% of respondents indicated that they currently run production applications and…

The post New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service appeared first on .

Read more

Migrating Network Protection to the Cloud with Confidence

Credit to Author: Trend Micro| Date: Thu, 11 Jul 2019 12:11:50 +0000

For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….

The post Migrating Network Protection to the Cloud with Confidence appeared first on .

Read more

AWS re:Inforce 2019 re:Cap

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 27 Jun 2019 18:31:29 +0000

A wide angle shot of the conference registration desk for AWS re:Inforce with an endcap wall in a slight teal blue saying, "Welcome to AWS re:Inforce"

The inaugural AWS Cloud security conference—AWS re:Inforce—was held in Boston this week. Well over 8,000 attendees descended on the Boston Convention and Exhibition Center for two days jammed packed with security education and cloud content. This was a very interesting conference because the dynamics of the attendees felt very different from typical AWS events. Usually…

The post AWS re:Inforce 2019 re:Cap appeared first on .

Read more

The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide

Credit to Author: Trend Micro| Date: Tue, 30 Apr 2019 13:00:51 +0000

Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, it’s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs. Good practices can help security teams build a strategy that…

The post The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide appeared first on .

Read more

AWS Security Hub and Deep Security

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 28 Nov 2018 20:33:14 +0000

Deep Security and AWS Security Hub integration

One of the biggest challenges in maintaining your security posture is visibility. You have security controls deployed throughout the stack, and each fo these tools is generating its own set of data points and has its own view of your deployment. Managing the multitude of alerts and events from these tools can quickly get overwhelming….

The post AWS Security Hub and Deep Security appeared first on .

Read more