Remove tags Risk Management
article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. EP109 How Google Does Vulnerability Management: The Not So Secret Secrets!”

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

<a href='/blog?tag=Inbound tag=Inbound Threats'>Inbound Threats</a> <a href='/blog?tag=File tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Email Yet they are not without risk in terms of cybersecurity. Request a Demo. Additional Resources. Featured: .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Enhance Data Loss Prevention in Office 365

Security Boulevard

<a href='/blog?tag=Cybersecurity'>Cybersecurity</a> tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Data tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=IT Request a Demo. Additional Resources. Featured: .

article thumbnail

Reinventing Asset Management for Cybersecurity Professionals

IT Security Guru

Understanding the risk context of every asset helps them decide what requires immediate action, and what can be done incrementally or mitigated with other changes or ignored as too low risk. They need automation when they want it, so that action is taken automatically based on the security risk policies they have put in place.

article thumbnail

How Do You Quantify Risk? Best Techniques

Centraleyes

Categorizing risks as high, medium, or low has been the go-to method for organizations seeking to prioritize their cybersecurity efforts. Ten Risks in a Bed Remember the nursery rhyme? Enter the need for a more precise and actionable approach — Cyber Risk Quantification. What is Cyber Risk Quantification?

Risk 52
article thumbnail

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Security Boulevard

<a href='/blog?tag=Endpoint tag=Endpoint Protection'>Endpoint Protection</a> <a href='/blog?tag=Data tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=File tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Advanced

article thumbnail

SAP Patch Day: December 2023

Security Boulevard

SAP Security Note #3350297 , tagged with a CVSS score of 9.1, The New HotNews Note in Detail SAP Security Note #3411067 , tagged with a CVSS score of 9.1, SAP has released a blog post on Security Note #3411067 that emphasizes the importance of updating the affected components.