article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Alexandra Heckler is Chief Information Security Officer at Collins Aerospace, where she leads a diverse team of cyber strategy and defense experts to protect against cyber threats and ensure regulatory compliance. Collins Aerospace.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

Containerized applications are often used during a cloud migration to ensure the safety of the assets involved. They also come in handy with shared virtual machines and movement within the cloud. This means successfully implementing cybersecurity asset management in addition to cyber hygiene education and remediation planning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cloud Security Issues: Threats, Risks, Challenges & Solutions

eSecurity Planet

Cloud security issues refer to the threats, risks, and challenges in the cloud environment. Threats are active attacks that target system weaknesses. Risks include potential damage from cyber threats and vulnerabilities. Challenges are gaps and barriers to attaining good security.

Risk 70
article thumbnail

Unlocking the Cloud: Microsoft and Thales Spearhead Passwordless & MFA for Organizations moving to Microsoft 365.

Thales Cloud Protection & Licensing

This partner drives major identity-related initiatives and educates the market on how to protect identities. Crucially, this award recognizes the teamwork carried out over several years by Microsoft and Thales to help organizations secure their identities when migrating to the cloud.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

As the economy grows increasingly data-driven, and as cyber threats proliferate, business leaders recognize they must find a more effective approach to protecting their intellectual property, financial records, employee and customer information, and other sensitive data — while also ensuring their employees’ access to that data is not hindered.