Advertisement

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Cloud infrastructure operators should quickly patch VMware Cloud Director flaw

Left unpatched, this command injection flaw could allow attackers to take control of a virtualized cloud infrastructure.


Virtual Event

At this digital roundtable – alongside your peers and in partnership with Equinix – you will get the chance to discuss how well your business continuity plans have held up through the pandemic, what has changed and what you will keep after the crisis has dissipated.

Virtual Event

During this Digital Big Conversation you will learn about the wider industry headwinds which are shaping enterprise infrastructure of the future and how AMD itself is changing the game with its multicore EPYC platform, allowing customers to squeeze more out of their existing data centre envelope at a lower total cost of ownership.

London

The CIO 100 is a showcase of the crucial technology projects, IT strategies, innovations, ideas, change management and transformation initiatives CIOs in and from the UK are delivering to customers, organisations, partners and sectors.

The May Fair Hotel, London

The inaugural CSO30 is a celebration of the role of the CSO and recognises the leading security executives in the UK.

CSO  >  Antivirus symbol on binary background

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.


stethoscope mobile healthcare ipad tablet doctor patient

How NHS Digital is meeting COVID-19 cybersecurity challenges

Earlier response to the WannaCry crisis has helped create an infrastructure where UK healthcare organizations get better security support and threat intelligence


With the need for efficient collaboration tools exploding in recent months, a variety of companies hope to refine how those tools work and what they can do. We look at six now pushing the envelope.


popcorn security theater lock by madartzgraphics and dbreen via pixabay

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...


cloud security expert casb binary cloud computing cloud security by metamorworks getty 100803072 or

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.


Advertisement

cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Episode 10: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 2

Podcast Episode 10: Listen now as Akamai CISO Andy Ellis and host Bob Bragdon continue their talk about the good guy/bad guy dynamic in the infosec community and why it can lead to being marginalized.


Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.


Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Managing vendor and supply chain risk in a recession

The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.


A conceptual representation of accessing username and password credentials.

Hashcat explained: Why you might need this password cracker

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.


digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.