KaaS Series: Cyber Security Mesh Architecture (CSMA) Liz LovelaceMay 5, 20230288 views EXPERT WEBINAR SERIES: CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized approach. Read more
Biggest Lie in the World (and Kevin’s Famous Chili Recipe) Beth ZiesenisMarch 27, 20220308 views He spilled the whole batch in the lobby, and no one got a bite. But that doesn’t mean his famous recipe is gone forever. A clever TikTok-er revealed that Peacock TV’s terms and conditions includes Kevin’s chili recipe buried in the tiny print as a reward for the very, very small percentage of subscribers who read the details. Almost No One Reads the Terms and Conditions Most apps or services require you to click a box to agree to their terms and conditions for use.… Read more
New Data Integrity Architectures for Mission Critical Systems GravicDecember 6, 20210492 views This article highlights some interesting work from Gravic Labs, Gravic’s Research and Development group, in the area of increasing the data integrity of mission critical systems. The article expands on our talk at The Connect NonStop TBC meeting in October 2021, and is a continuation of the topic that we presented in the July/August 2017 issue of The Connection[1].… Read more
XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop Steve TcherchianSeptember 21, 20210256 views Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low cost to execute and high value rate of return. Four percent might seem like a low number, but just one user falling victim to a phishing attempt is one too many.… Read more
Taming the Security Alert Tsunami with Automation Yash VartakSeptember 21, 20210392 views Are you running a Security Operations Center (SOC) that handles hundreds or thousands of alerts? Are your analysts unable to cope with a tsunami of events and eventually get burnt out? Are they unable to zero in on events of interest at speed and scale? Read more
State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act Stan WissemanSeptember 21, 20210442 views Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017 to 2020. The report also noted that the 50% increase in attacks is likely a fraction of the true number of incidents because many go unreported. Research by Barracuda Networks indicates that 44% of global ransomware attacks in 2020 targeted municipalities. Read more
Balancing Agility with Data Security Thomas GloerfeldSeptember 21, 20210291 views Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. As opposed to the traditional, slower forms of software development, with releases methodically planned and executed over many months or even years, Agile keeps the focus on speed, user feedback, and iterative refinement. Read more
A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison Shannon GillenwaterSeptember 21, 20210301 views $10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it may be, needs to be discussed and dealt with in every boardroom across the country. Read more
Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape Matt KimballSeptember 21, 20210253 views The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting IT functions for MSPs and their customers around the world. The impacted ranged from a grocery store in Sweden to a school district in Australia, and all points in between. Read more
Securing the edge is no longer enough. SPIFFE can protect your infrastructure Phil VachonSeptember 21, 20210424 views Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats... Read more