Remove Antivirus Remove Architecture Remove CISO Remove IoT
article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds. Tim drives the creation, architecture, strategy, and external visibility for products and solutions. Tim has held many roles in the cybersecurity space, including Fellow, Chief Architect, Distinguished Engineer and Board Advisor.

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away.

IoT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Road to Zero Trust

Thales Cloud Protection & Licensing

One of the biggest challenges is likely to be, how you actually make the transition to a Zero Trust model whilst still having to maintain investment from your previous IT security tools and architectures, which were likely built around more perimeter-based models. Gabriel Whalen, Manager Information Security Solutions, CDW.

Risk 77
article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

Infrastructure Protection Defense against DDoS and DNS attacks starts with effective network security architecture. Endpoint protection platform (EPP) and Endpoint detection and response (EDR) : Add features to antivirus to detect malicious behavior and proactively block attacks.