Connecting the Dots on OT/IT Convergence

Connecting the Dots on OT/IT Convergence

| | Uncategorized
Gabe is Back In the heady days of massive network infrastructure growth there was a single analyst who knew the vendors cold. And all of us on the Wall Street briefing circuit ...

Addiction Rehabilitation Centers Expose 150k Patient Records

| | Uncategorized
The post Addiction Rehabilitation Centers Expose 150k Patient Records appeared first on DivvyCloud ...
Converged Infrastructure: The Cyber Security Stakes are Higher than Ever

Converged Infrastructure: The Cyber Security Stakes are Higher than Ever

| | Uncategorized
Promiscuous Connectivity The TCP/IP stack made it easy for billions of devices to connect over the internet in just a few decades, starting in the 1990s. Now we’re expecting more than 75 ...
Automating Your AWS Landing Zone

Automating Your AWS Landing Zone

| | Uncategorized
The post Automating Your AWS Landing Zone appeared first on DivvyCloud ...
Understanding Key Management Policy – Part 2

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

| | Uncategorized
Whenever there’s a major data breach one of the first things everyone asks is, “Was the data encrypted?” This is a very natural question to ask because since the 1970s encryption has ...
Archived: Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

Archived: Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

| | Uncategorized
Whenever there’s a major data breach one of the first things everyone asks is, “Was the data encrypted?” This is a very natural question to ask because since the 1970s encryption has ...
The case for 'cloud access security brokers' by Byron Acohido

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever Caz-bees first took shape as a cottage industry circa 2013 ...
Bueller? - Ferris Bueller's Day Off (1/3) Movie CLIP (1986) HD

Will the next war be cyber?

| | Uncategorized
In 2018 I moderated a Future in Review panel on Russian cyber meddling in Ukraine. One of my comments during the panel (“What happens in Ukraine doesn’t stay in Ukraine.”) ended up ...
Business Email Compromise Attacks Increase by Nearly 500%

Business Email Compromise Attacks Increase by Nearly 500%

Business email compromise attacks are designed to bypass traditional email security measures, such as spam filters. Last year, the FBI reported that incidents of business email compromise (BEC), also known as spear ...
Loading...