IT
Operational Technology (OT) Security a Top Priority for CIOs
The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack ...
Security Boulevard
The Great CrowdStrike Crash, AI’s Role in Employee Smiles
Tom Eston | | AI, antivirus, CrowdStrike, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, employee, Employee Monitoring, Episodes, Information Security, Infosec, IT, IT Outage, Japan, Microsoft, Mister Smile, Mr. Smile, outage, Podcast, Podcasts, Privacy, security, Smiles, technology, update, Weekly Edition, Windows, Workplace, Worldwide
In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss ...
Survey: Nearly Half of SMEs Fell Victim to Cyberattack in Last Six Months
A survey shows that nearly half of all small-to-medium enterprises (SMEs) fell victim to cyberattacks in the first half of this year ...
Security Boulevard
Why Is Reliable Software Surprising?
Joao Correia | | AI, IT, Kernel Care Enterprise, Linux Tips & Patch Management, maintenance work, Reliable Software
Software comes in all shapes and sizes: monolith applications, small utilities, run-of-the-mill middleware, web platforms, mobile apps, etc.. But it seems like finding one that actually “just works” as advertised is increasingly ...
Survey Surfaces Lack of Confidence in Security Tools
Michael Vizard | | AI, Cybersecurity, hybrid cloud, IT, IT leaders, Security Automation, Security Tools
A global survey of more than 1,033 security and IT leaders published today finds nearly two-thirds (65%) lack confidence that their existing security tooling cannot effectively detect breaches ...
Security Boulevard
What is Proxmox VE – and Why You Should Live Patch It
Rohan Timalsina | | DEVOPS, IT, Live Patching Education, open source, Proxmox, virtual patching, Virtualization, What Is Proxmox VE Used For
Proxmox VE, like any software, is vulnerable to security threats. Patching helps address these vulnerabilities, protecting your virtual machines from attacks. Traditional patching methods often require taking systems offline, leading to downtime ...
Implementing Risk Compliance and Management in Linux Systems: A Practical Guide
Anca Trusca | | Implementing Risk Compliance and Management in Linux, IT, Linux Risk Compliance, linux systems, Linux Tips & Patch Management
Regular security audits and up-to-date patch management are essential for Linux compliance. User access control and robust network security are critical to safeguard Linux systems. Adapting compliance frameworks like ISO 27001 to ...
0-days, n-days, too many days
A software vendor, a threat actor, and a bug bounty hunter walk into a bar. The bug bounty hunter goes “have you guys heard about this new bug I just spotted?” “Never ...
Innovation With a Security-First Mindset
Olga Lagunova | | collaboration, Cybersecurity, Innovation, IT, Product, product delivery, security, security-first
Prioritizing a robust security-first position does not have to hinder productivity or the ability of teams to achieve business goals ...
Security Boulevard
How Process Automation Can Help Streamline Security
Prabz Saimbhi | | anomaly detection, Automation, Cybersecurity, IT, process automation, remediation, security
Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture ...
Security Boulevard