article thumbnail

The business case for security strategy and architecture

Notice Bored

c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.); c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.);

article thumbnail

BSides Knoxville 2023 – Hudson Bush – Enterprise Security Architecture Isn’t Just For Enterprises Anymore

Security Boulevard

Permalink The post BSides Knoxville 2023 – Hudson Bush – Enterprise Security Architecture Isn’t Just For Enterprises Anymore appeared first on Security Boulevard. Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DEF CON 31 – Noam Moshe’s, Sharon Brizino’s ‘Exploiting OPC UA – Practical Attacks Against OPC UA Architectures’

Security Boulevard

Permalink The post DEF CON 31 – Noam Moshe’s, Sharon Brizino’s ‘Exploiting OPC UA – Practical Attacks Against OPC UA Architectures’ appeared first on Security Boulevard. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel.

article thumbnail

BSides Knoxville 2023 – Sara Anstey – Educating Your Guesses: How To Quantify Risk and Uncertainty

Security Boulevard

Permalink The post BSides Knoxville 2023 – Sara Anstey – Educating Your Guesses: How To Quantify Risk and Uncertainty appeared first on Security Boulevard. Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel.

article thumbnail

USENIX Security ’23 – Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability

Security Boulevard

Permalink The post USENIX Security ’23 – Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability appeared first on Security Boulevard. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

article thumbnail

How to evolve your organization into a data-centric security architecture

CyberSecurity Insiders

Another key component to consider is continuing education for yourself and members of your organization, and there are many ways to make safety training useful and effective. The post How to evolve your organization into a data-centric security architecture appeared first on Cybersecurity Insiders.

article thumbnail

BSides Prishtina 2022 – Shkumbin Saneja’s ‘Towards Zero Trust Architecture’

Security Boulevard

The post BSides Prishtina 2022 – Shkumbin Saneja’s ‘Towards Zero Trust Architecture’ appeared first on Security Boulevard. Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel.