Remove Architecture Remove CISO Remove Firewall Remove Information Security
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

Companies transitioning to the cloud have to think of cybersecurity as more than firewalls, access controls and incident response, and define goals of security that go beyond confidentiality, integrity and availability, said Randy Vickers, chief information security officer for the U.S. (Sean Gallup/Getty Images).

article thumbnail

Startup Traceable turns to CISO investors for next phase of growth

SC Magazine

Their platform operates as both a web application firewall and run time application self-protection, using machine learning to monitor their customers’ APIs and applications, identify baseline user and application behaviors and over time, learn how to best to detect and block malicious activity.

CISO 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Gregory Touhill, former federal chief information security officer and deputy assistant Homeland Security secretary for cyber security operations, seen here at a House Foreign Affairs Committee hearing in 2015 in Washington, DC. chief information security officer. Photo by Mark Wilson/Getty Images).

CISO 109
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post from the Cyentia Institute and RiskRecon. But what does that correlation mean for chief information security officers? So, how can CISOs operationalize that kind of information?

IoT 98
article thumbnail

AT&T Cybersecurity’s managed SASE service wins CyberSecurity Breakthrough award

CyberSecurity Insiders

As organizations strive for excellence in digital transformation and face the realities of an accelerated push to remote work, they’ve been called to rethink their networking and cybersecurity architecture. SASE helps future-proof cybersecurity architecture by decoupling security control from the data center.

article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of known exploited vulnerabilities that can be referenced to check for active exploitation. For example, a vulnerability in a wi-fi router firewall configuration may expose Windows 95 machines required to run manufacturing equipment.

article thumbnail

State auditor’s office clashes with file transfer service provider after breach

SC Magazine

But the SAO is accusing Accellion of being less than forthcoming, with officials explaining in a virtual press conference and a public statement that it was not aware of any security incident at Accellion until the Jan. 12 bug notification, and it was “not until the week of Jan. Future exploits, however, are a constant threat.