article thumbnail

Thousands of Data Center Management Apps Exposed to Internet

eSecurity Planet

Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured with default factory passwords, posing a significant cyber risk to enterprises worldwide. Exposing that to the public internet is like allowing terrorists to direct air traffic control.”.

Internet 120
article thumbnail

2021 Security Outcomes Study: Stress Relief for CISOs

Cisco Security

This intensification of our digital life, with shopping, work, leisure, and several other activities that we were able to take into the networks, just shed more light on a confrontation that needs to be collective and global – the fight against cyber threats and crimes. So, what is an already over-stressed CISO to do?

CISO 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

Schrade r: The legacy is a group of CISOs from companies like Facebook, Google, Microsoft, Cisco, Oracle, Mastercard, Visa, Bank of America, Wells Fargo and a lot of others. LW: What should we all understand about cyber threats as they exist today? We’re all continually exposed to cyber threats.

Internet 160
article thumbnail

Spotlight Podcast: Public Sector levels up to tackle Cyber Threats

The Security Ledger

In this Spotlight edition of the podcast, sponsored* by RSA Security, we go deep on public sector cyber risk with two interviews from the most recent RSA Conference: Kelvin Coleman, the Executive Director of the National Cyber Security Alliance (NCSA) and Sean McHenry, the CISO of the Utah State Board of Education. Industry 4.0

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. One prominent threat is business email compromise (BEC), which remains a leading vector for cyber threats. With the maturation of Zero Trust, propelled by the U.S.

article thumbnail

MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’

The Last Watchdog

Org overhaul As Todd reports, not only is Microsoft basing a portion of senior executive compensation on progress toward security goals, it also will install deputy chief information security officers (CISOs) in each product group,and bring together teams from its major platforms and product teams in “engineering waves” to overhaul security.

Software 100
article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

The new normal CISOs face today is something of a nightmare. They must take into account a widely scattered workforce and somehow comprehensively mitigate new and evolving cyber threats. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be. (LW