article thumbnail

Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT

The Security Ledger

The Kry10 platform is billed as a zero trust architecture that is capable of limiting the code that can run in privileged mode and isolate non-core capabilities as possible. Click the icon below to listen. Related Stories Episode 250: Window Snyder of Thistle on Making IoT Security Easy Forget the IoT.

IoT 52
article thumbnail

Spotlight on Cybersecurity Leaders: Glenn Kapetansky

SecureWorld News

For more than 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. Fun fact: my six years as CSO of Trexin is my first official full-time security role! Answer: Energized.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Last Friday, July 2, in a matter of a few minutes, a Russian hacking collective, known as REvil, distributed leading-edge ransomware to thousands of small- and mid-sized businesses (SMBs) across the planet — and succeeded in locking out critical systems in at least 1,500 of them. Dom Glavach, CSO and chief strategist, CyberSN.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said.

article thumbnail

Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud Environment

McAfee

Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Its cloud-native, open architecture was exactly the right fit for Legendary Entertainment’s environment.

article thumbnail

Transforming to a Predictive Cyber Defense

McAfee

While the vast majority of our customers made the overnight switch—many still need to adopt a cloud-native architecture. Thanks in part to the harsh publicity and severe damage caused by state-sponsored hacks that day is finally in sight. No doubt the best transformations are the ones you plan for and manage from end-to-end.

CISO 100
article thumbnail

BrandPost: Scary Cyber Threats and Sweet Solutions

CSO Magazine

The CIS Benchmarks serve as an excellent step toward providing the expected policies on systems that can be verified on a continuous basis in support of zero trust architectures.”. explains the top attack types: Malware, Ransomware, Web Application Hacking, Insider Privilege and Misuse, and Targeted Intrusions.”.