Remove Digital transformation Remove Information Security Remove InfoSec Remove Risk
article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Risks to Your Network from Insecure Code Signing Processes. However, this practice puts these critical resources at risk for being misused or compromised. Many InfoSec teams don’t have the visibility into what their software development teams are doing. In years past, InfoSec may have been the central keeper of code signing.

Risk 98
article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk. InfoSec 360.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

Cyber CEO: 5 Outdated but Common Cybersecurity Practices You Should Avoid

Herjavec Group

Enterprises have experienced lightning-fast digital transformation over the past 18 months. For many teams, the priority was set on keeping the lights on and surviving, leaving their security teams grappling to catch up once the company’s operations were already online. Fortify areas that are most at risk.

article thumbnail

How You Can Effectively Manage Your SSH Keys Towards Zero Trust Security

Security Boulevard

Because of the ongoing digital transformation efforts, large enterprises have accumulated tens of thousands of SSH keys in their environment. Risks associated with SSH keys (orphaned keys, duplicate keys, etc.). They also provide better visibility for InfoSec teams by providing insight into who is requesting the certificates.

Risk 52
article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

This forced security leaders and enterprise executives to assess their information security operations and overall cybersecurity posture to ensure their organizations were ready to face the challenges ahead. Mitigate Vulnerability Risk. Data breaches and cybersecurity threats were at an all-time high this past year.

article thumbnail

Cyber CEO: The Cybersecurity Skills Gap – How to Address it Now and in the Future

Herjavec Group

The cybersecurity skills gap has continued to be a problem – one that’s only gotten worse due to the pandemic and digital transformation that most organizations recently experienced. Inspire those who would excel in an information security career. Engage a Managed Security Service Provider.