Remove Architecture Remove Risk Remove Technology Remove Whitepaper
article thumbnail

Securing Containers with NIST 800-190 and MVISION CNAPP

McAfee

Government and Private Sector organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container technologies across on-premises, cloud, and hybrid environments. Unfortunately, this also compounds supply chain risks and presents an ever-increasing attack surface.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

For businesses still using the broken SHA-1, they were facing serious risks , including: Increased possibility of a collision or man-in-the-middle attack. NIST has developed a whitepaper which outlines the steps for migration to post-quantum cryptography. Prepare a quantum-safe architecture now. Crypto-agility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

In this blog we set out to see how choosing the correct security controls framework can go a long way in establishing a secure foundation, which then allows Enterprise security designers/decision makers to make more informed solution choices while selecting the controls and vendor architectures.

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

With more employees working remotely than ever before due to COVID-19, businesses are at greater risk from a cyber-attack with workers accessing systems outside of the usual company network. You can’t scrimp on discovery, but no standard risk assessment scales. Once that is done, implementation of specific technologies can begin.

article thumbnail

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Security Boulevard

Subvert X,” where X is a synthesis of unfamiliar technologies, is often tasked and required to complete assessment objectives. The presentation and whitepaper in particular did a great job of introducing machine learning to security professionals. Revoke-Obfuscation and this post stick purely to the obfuscation detection problem.

article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

Our imaginary supermarket architecture consists of: A main supermarket store. So, let’s consider a supermarket as if it were a well-known and respected enterprise with information technology (IT) capabilities and a cybersecurity program, what does the supermarket look like then? A 24-hour convenience store. A distribution center.

InfoSec 52