Purdue University’s CERIAS 2021 Security Symposium – Yoon Auh ‘s ‘NUTS: The Beta Demo, NUTS Technologies Inc.’

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel ...

Purdue University’s CERIAS 2021 Security Symposium – Jordan Mauriello’s ‘Understanding Attackers and Motivations’

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel ...
data privacy FTC NIST data Privacy Framework

Data Privacy Laws Add Complexity to Securing the Cloud

There are 12 states currently considering new data privacy laws or considering making updates and changes to laws that are already in place. The Virginia Consumer Data Protection Act (VCDPA), for example, ...
Security Boulevard

How to use the Gartner® 2022 Strategic Roadmap for Data Security Platform Convergence

“It is not the strongest species that survive, nor the most intelligent, but the ones most responsive to change.” – Charles Darwin Evolution and innovation form the basis of most modern business ...
By the Numbers: The Cost of Insider Data Breach vs The Cost of Protection

By the Numbers: The Cost of Insider Data Breach vs The Cost of Protection

The global business data security landscape has become dramatically more challenging over the last few years. One of the main reasons for this is insider threats, as reported in the 2022 Cost ...
AppSec

Identity Management Challenges of M&A

Recent research revealed the number of mergers and acquisitions (M&A) reached approximately 62,000 globally in 2021, up an unprecedented 24% from the previous year—and 2022 is projected to have significantly higher numbers. However, ...
Security Boulevard

Healthcare Providers Need to Increase Budgets for Cybersecurity

The past few years have emphasized just how important cybersecurity is. As cybercrime reached record heights and more companies went digital, industries realized their current security efforts fell short. Healthcare is a ...

3 Steps to Putting a Modern Database Security Solution into Practice

As a Senior Security Solution Engineer, experience has shown me that there are no magic bullets when it comes to stopping data breaches. They are going to happen. What makes a data ...
Lacework ABAC Axiomatics Cado Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Automation is the Top Cloud Security Priority

Two years of pandemic-forced remote work has shown how much organizations depend on cloud computing. Employees want to work at home, convinced they are more productive from a remote office than at ...
Security Boulevard

5 Ways to Determine if you do Cybersecurity or Cybersecurity Theater

For a sentient species, humans, in general, have curious ideas when it comes to reckoning and responding to risk. For example, studies show using seat belts when driving in automobiles save lives ...

Secure Guardrails