article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Empirical Evaluation of Secure Development Processes

Adam Shostack

Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I’m also pleased to say that the workshop report is now available at [link]. This situation leaves developers and industry in a rather undesirable situation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 2

SecureList

If you have read our previous blogpost “ Targeted Malware Reverse Engineering Workshop follow-up. Rust/Go malware, CPU architectures beyond x86 and x64, ARM arch and Mac OS, etc. The course seems to include various topics on RE. Anything that has been left out? Probably saved for a future update to the course.

article thumbnail

Introduction to the purpose of AWS Transit Gateway

CyberSecurity Insiders

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Global/Multi-Site Enterprise Architecture Many organizations are using Global/Multi-site with dated technology spread throughout data centers and networks mixed in with some newer technologies.

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

What further compounds an already complex architectural and security landscape is the fact that critical infrastructure industries in various countries tend to be either partially or fully government controlled; with many providing “essential services” such as Healthcare, Water, Power, Emergency Services and Food production.

IoT 134
article thumbnail

Don’t Settle for a Vendorship When You Can Have a Partnership

Duo's Security Blog

Configuration and Deployment Resources — Does the vendor provide resources to help me properly configure the solution and deploy it into my architecture or to my users? If you’re looking for any — or all — of the following from a vendor, then it’s time to move from a vendorship to a partnership.

article thumbnail

It’s a party! Cisco SecureX at RSAC and Cisco Live US 2022

Cisco Security

We’ll have experts on hand to walk you through what we can learn from a feed of RSA Conference traffic throughout the week, using multiple Cisco Secure products, pulled together with the SecureX cross-platform architecture. Cisco SecureX at Cisco Live 2022. 1:00 PM.

Firewall 112