article thumbnail

CSO of the Year | Dan Meacham helps Legendary Entertainment’s movie magic live safely in the cloud

SC Magazine

Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. Meacham’s architecture allowed the company to ensure the secure editing of projects anywhere in the world via the cloud.

CSO 69
article thumbnail

CISA's Cloud Security Technical Reference Architecture: Where it succeeds and where it falls short

CSO Magazine

President Biden’s Executive Order 14028 “Improving the Nation’s Cybersecurity” directed the Cybersecurity and Infrastructure Security Agency (CISA) to create a cloud-security technical reference architecture (RA ) in coordination with the Office of Management and Budget (OMB) and the Federal Risk and Authorization Management Program ( FedRAMP ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Time to check software and security settings for Windows network vulnerabilities

CSO Magazine

Learn the must-have features in a modern network security architecture and the 7 tenets of zero trust. | Get the latest from CSO by signing up for our newsletters. ] In honor of this event, I urge you to take the month of October to become more aware of your computer and network assets. To read this article in full, please click here

CSO 114
article thumbnail

BrandPost: Network Security and the Heart of a Zero Trust Architecture

CSO Magazine

The heart of any Zero Trust Architecture (ZTA) is an authorization core involving equipment within the control plane of the network that determines this confidence and continually evaluates confidence for every request.

article thumbnail

Unpatched Exchange Servers an overlooked risk

CSO Magazine

Learn the must-have features in a modern network security architecture. | Get the latest from CSO by signing up for our newsletters. ] The two bad practices are: Use of unsupported (or end-of-life) software. Use of known/fixed/default passwords and credentials. To read this article in full, please click here

CSO 127
article thumbnail

Edge computing: The architecture of the future

CSO Magazine

To fully digitize the last mile of business, you need to distribute compute power where it's needed most -- right next to IoT devices that collect data from the real world.

article thumbnail

Amazon Sidewalk highlights network security visibility risks consumer services pose

CSO Magazine

Learn the must-have features in a modern network security architecture. | Get the latest from CSO by signing up for our newsletters. ] The findings come as vast numbers of employees continue to work from home and connect to corporate networks remotely. To read this article in full, please click here