Pular para o conteúdo principal

Postagens

New CISO Intelligent Issue 46

New CISO Intelligent Issue 46 Rise of ransomware - How this attack method is destabilizing cyber-insurance - and what to do Cybersecurity collaboration - Importance of collaborating to keep up with the ever-evolving threat landscape Inspiring the future - How the younger generation can help to close the cybersecurity skills gap Security Delivery - Erik Hart, CISO at Cushman and Wakefield, explains how the company relies on Mimecast to protect its email systems and to ensure continued information security innovation Cyber trends - Get ready for public extortion serious scams and AI; cyber in 2022 and beyond Infographic - Trend Micro study reveals urgent need for new way to discuss business risk Threat updates - Latest updates from across the globe, the US and Italy How much of a concern is protecting critical infrastructure and how should organizations go about doing this pragmatically? How ransomware is destabilizing cyber Insurance - and what to do about it Business surveillance - The...

Dado é o novo petróleo. Mas e a privacidade no Metaverso?

Sem dúvida, as integrações tecnológicas com uso de AI, Machine Learning, realidades virtual e aumentada, biometria e dispositivos trazem inúmeras possibilidades para a inovação dos negócios. Mas as estratégias de incluir esse novo universo no cotidiano das empresas estão levando em conta a importância de proteger os dados dos usuários? 20 pontos de riscos e alertas para o CISO *Por Rangel Rodrigues Desde primórdios da Internet, provedores, bancos e serviços online enfrentaram o desafio de proteger os dados de seus clientes que eram capturados para um propósito, seja para assistir o cliente ou para interesse comercial. Nesta época, a preocupação da privacidade já era colocada em pauta. Naturalmente, a Internet evoluiu agregando valor em muitas áreas, como a imersão no mundo digital e web em nossos bolsos. Por outro lado, também passou a ser usada pelo lado oculto; a engenharia social, sequestro de contas, roubo de informações, pichação de sites, pedofilia e privacidade, aspectos que pas...

New CISO Intelligent - Issue 45

New CISO Intelligent - Issue 45 Tailoring Security - Leon Shepherd, CIO, Ted Baker, tells us how one of Britain’s leading fashion brands relies on Darktrace’s AI technology to protect its digital systems and how the solution enables the company to focus on higher-value tasks. 2022 priorities - Attivo Networks experts share their evidence-based forecasts for the next 12 months. Healthy protection - NCSC protects vaccine rollout and mitigates record number of cyber incidents. Budgetting Investimento - Five best practices for maximizing security on a tight budget. Cyber trends - Cybersecurity predictions: Identity protection to be a priority in 2022. Infographic - 70% of security and IT pros find security hygiene and posture management challeging. What trends do you expect to develop in the cybersecurity space in 2022? Why data storage is an integral part of a CISO’s IT security strategy. CISOS on the front line: What’s ahead for cybersecurity in 2022. More than half of UK business plan t...

Intelligent CISO - Issue 43

Intelligent CISO - Issue 43 Ransomware pandemic - How business can implement the right tools to better protect themselves Zero Trust fears - Shedding light on the anxiety surrounding this cybersecurity approach Goveming bodies unite - Coming together to target ransomware attackers to critical infrastructure Secure Access - Eberhard Haugh, CISO, DB Schenker, tells us how the company - as one of the leading global logistics providers - extended its existing identity and Access Management (IAM) infrastructure to secure employee access Latest intelligence - Latest white papers from Bitdefender an Weston Cyber trends - The ransomware pandemic and how business can protect themselves Threat updates - Latest updates from across the globe, the United States and the United Kingdom Barracuda introduces data classification capabilities to help customers find sensitive data CloudBees survey reveals C-suite supply chain security concerns The ransomware pandemic and how business can protect themselve...

A corrida contra o tempo chegou: modelos cloud e multicloud são reais

O poder que existe na computação em nuvem torna o negócio mais sustentável, mas ao mesmo tempo, exige atenção redobrada em aspectos de Segurança, controle e gestão de vulnerabilidade. Pontos que precisam ser considerados para a boa governança com recurso de cloud security cyber hygiene *Por Rangel Rodrigues A velocidade da transformação digital tem impulsionado a adoção de novas tecnologias como machine learning e inteligência artificial. Além disso, a pandemia acelerou o processo de migração para cloud, uma saída que as empresas encontraram para garantir a continuidade dos negócios com o trabalho remoto e, nesta linha, a tecnologia Zero Trust ganhou força, pois viabiliza o controle de acesso por meio de usuários e ativos ajudando as organizações a reduzir os riscos neste novo cenário. Consequentemente, a evolução da automatização do processo de desenvolvimento de software (SDLC) integrado com a cloud requer novas ferramentas. O uso de infraestrutura-as-code com soluções capazes de ger...

CSO: Don't Ignore Vulnerability Management!

Thinking like a hacker, knowing how to exploit loopholes by creating or editing code, and understanding how security holes are used can help you understand and manage patch and patch application. Two months ago I mentioned in an article “Advance to 'Next Level' Security” the challenge of keep a system or service up to date by the time the vulnerability is discovered versus the time to apply a patch mid-2000. Notorious that manufacturers on the one hand developed new software consequently brought new vulnerabilities and the most exploited at that time was the webservers, whether on Unix platform, Linux or Windows were not yet mature. Of course, services such as DNS, FTP, Telnet, Netbios, among others, were also massacred. Crackers used their ability to create exploits to exploit vulnerabilities in Internet services, and at the time, as I worked for an American bank, it was many early hours to update the environment and fix web server failures. Although it was run was challengin...

Intelligent CISO Issue 41

Intelligent CISO Issue 41 - CISOs driving blindfolded - How CISOs are overcoming limited visibility after COVID-19 triggered increase in cyberattacks - Physical security - The procedures data centre leaders should have in place to ensure their facilities are secure - Consctructing robust security - Achieving a comprehensive risk-based cybersecurity strategy in the construction industry - Accelerating security - Keith O’Gorman, GISSM at Archroma, discusses how the organization relies on Edgescan technology to continuously scan its systems for vulnerabilities across its IT infrastructure - Cyber trends - Survey reveals UK CISOs driving blindfolded, with limited visibility and control - Infrographic - Australian capital market firms respond to new risk management demands - What procedures should data centre leaders have in place to ensure their facilities are physically secure? - Ransomware, phishing, Zero Trust and the new normal of cybersecurity - Security is a journey, not a destinati...