When most IT managers think about cybersecurity, they're thinking about keeping their company's data safe from criminals and cyber-warfare opponents. Some service providers, most recently DreamHost, have expanded that list of adversaries to include the US Department of Justice. And on August 22, DreamHost scored a small victory in their most recent battle.
Delaware has become the latest state to enact legislation on computer security, joining at least 13 other states in setting specific requirements for companies doing business within their borders. Delaware's law is notable in two regards, the first involving the nature of Delaware and the second a critical provision within the law itself.
When it comes to authorized access, you need to know the system that's trying to connect and you need to know and trust the human behind the system. Knowing the human is the first part of what Starling Identity Analytics & Risk Intelligence (IARI), a new SaaS-based service from One Identity, does for the enterprise.
We move data around systems and networks, but in the final analysis everything comes down to the applications. And in 2017 the news is still filled with stories of companies that left a door open to their data and systems -- an accidental door right in the middle of their enterprise applications. That's why this week's episode of Voice of Security is all ...
What is it about Amazon S3? While thousands of customers are able to securely keep data on the large storage cloud, a disconcerting number of companies seem to lose the ability to correctly configure storage when faced with the Amazon Web Services buckets. The latest misconfiguration victim? Groupize, a meeting management and hotel-booking company based ...
Philip Lieberman President and CEO, Lieberman Software Corp., | 8/21/2017
For several years now, I have advocated that CEOs must begin acting as the Commander-in-Chief of cyber warfare for their companies. This role would involve the chief executive building resiliency into not only the business itself but also into IT, which is now key to the survival of the business.
When DevSecOps are defined it can begin a process. But ultimately process requires tools to become practice. Where do you go to find tools to use when an organization wants to move beyond theory adding security to DevOps?
With the media doing its best to scare the daylights out of Americans over the North Korean nuclear threat, it's missing out on the real menace that is causing real damage: Kim Jong-un's brigade of hackers and cyber thieves.
Michael Lynch Chief Strategy Officer, InAuth, | 8/17/2017
Digital Identity has many definitions. Digital identity is known to be the online representation of a person's civil and personal identity. Some of the newer ways of describing digital identity also describe it as the entire collection of data associated with a person's interactions online. In certain scenarios, the device or application the person is ...