PCI DSS 4.0 Is Coming. Will You Be Ready? Steve TcherchianJune 15, 20210342 views Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in April 2015 which highlighted the risks of SSL and TLS 1.0. The supplement described a migration plan as well as set a migration deadline of 1 July, 2016. Read more
Security Champions – they can help put the “SEC” in DevSecOps Stan WissemanJune 15, 20210564 views While DevOps can mean different things to different people or organizations, ideally security is an implied requirement of successful DevOps and there’s no need to differentiate by adding the “Sec”. Security should already be embedded. Read more
Digital Transformation For Public Sector Agencies Starts With Better Data Management And Strategies CohesityMarch 23, 20210291 views Digital transformation is more than just a buzzword. For many government agencies, it’s a long-overdue necessity that can be broken down into three main improvement areas: better data insights, better delivery models (especially through mobile technology) and a better customer experience. Read more
When it comes to Digital Transformation, Don’t Forget Security Neil CorreaDecember 8, 20200300 views Digital transformation (DX) is the natural evolution of traditional business operations allowing organizations to capitalize on the full capabilities of our technological advancements, meet consumer expectations and keep competitors at bay (or at least be on par with them). DX isn’t just a cookie cutter deployment of on-prem systems migrated to the ‘cloud.’ In fact, that in itself may be considered a terrible cloud migration strategy resulting in more risk and costs (leaky S3 bucket anyone?). Read more
Zoom Security Settings You Need to Check Right Now Beth ZiesenisDecember 8, 20200285 views Newsflash: Zoom bombing is still a thing. This week I was in a session that was hijacked by horrible people sharing porn, racist language, disgusting images and vile language. Here’s how you can avoid the same issues. Note: some of these settings and options are for different levels of Zoom subscriptions, so you may have more or fewer, depending on your account.… Read more
A Workplace Paradigm Shift: Building Resilience in Our Workforce and Systems with HPE GreenLake John SrokaDecember 8, 20200366 views When the coronavirus pandemic forced everyone out of offices, IT teams scrambled to obtain the necessary hardware and additional software licenses necessary to support entirely remote operations. At the same time, they had to match users’ present and future needs with the appropriate infrastructure. That, combined with many other unknowns, compounded the stress and urgency to keep business running smoothly around the world.… Read more
Protecting Your Most Valuable Asset Demands A New Approach To Cybersecurity CohesitySeptember 22, 20200225 views Today, data is likely your most valuable and vulnerable strategic asset, and yet many of the methods for storing and protecting it are decades old. Data is not only a record of what has happened; it can also be used to anticipate the future and train machines to make human-like decisions in an instant. It has become a fungible and strategic asset that drives key processes. Read more
Integrate Your HPE NonStop Servers with SailPoint Identity Governance XYPRO TeamSeptember 22, 20200267 views Whether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution. Achieve user governance, provisioning and reconciliation of HPE NonStop user accounts directly from SailPoint. Read more