The calculus for disaster recovery and risk management is changing. Most small businesses within the past decade would often keep many of their critical technology assets locally, perhaps in a server closet, or a centralized data center for multiple offices. They built their own “vault” of applications, databases, email, files, etc., often on a few […]… Read More
October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with Facebook accounts, we’re all likely feeling a little dirty. So, I decided to share my perspectives on cyber hygiene. The dictionary defines hygiene as […]… Read More
Diligent taxpayers are being increasingly targeted by con artists who are well-versed in manipulating the revenue system. The crooks usually impersonate IRS (U.S. Internal Revenue Service) officials, sending fake emails or messages on social media in an attempt to defraud the targeted individuals of their money. Unfortunately, lots of people fall for these scams, and […]… Read More
Cybersecurity is becoming more of a common tongue term in today’s industry. It is being passed around the executive meetings along with financial information and projected marketing strategies. Here are some common attack vectors plaguing the industry when it comes to network infrastructure. It does not really matter the infrastructure type you have. If there […]… Read More
Changing consumer demands posed a serious challenge to the IT industry; it pushed firms to brainstorm about quick product delivery. This demand eventually gave rise to the demand for collaboration between Development (Dev) and Operations (Ops) teams, welcoming the DevOps trend. As a result, everything started progressing with increased development, enhanced collaboration, advanced testing, high […]… Read More
The post Integrating Security to DevOps: Fundamental Principles Are Crucial appeared first on The State of Security.
Working as a cybersecurity analyst is incredibly challenging. It’s one of the only roles in IT that requires 24/7/365 availability. The constant stressors of the job can overload security analysts, which ultimately leads to burnout—affecting every factor of the job from performance to talent retention. Recently recognized by the World Health Organization (WHO) as an […]… Read More
The post Don’t Let Your Analysts Become the Latest Victims of Burnout! appeared first on The State of Security.
Containers have become a popular technology for enterprises that need to create agile, scalable and reliable applications. As they’re moving containerized workloads into production, many are adopting Kubernetes for container orchestration. While containerization enables DevOps to deploy software fast and efficiently, it also creates new security challenges, especially for those who’ve accelerated their implementation of […]… Read More
The post Survey Reveals Kubernetes Usage Skyrocketing, but Security Concerns Remain appeared first on The State of Security.
In early July, NIST released draft versions of two new publications: NIST SP 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations and NIST SP 800-171B: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets. NIST explains that its “SP 800-171 Revision […]… Read More
The post Overview of NIST 800-171b: 33 Enhanced Security Requirements to Help Protect DoD Contractors appeared first on The State of Security.
This article will give you insights into the common PayPal hoaxes circulating these days. Additionally, you will learn how to keep your payment experience safe when using the popular service in question. The undeliverable shipment stratagem Crooks may try to defraud someone of money by reporting a delivery failure to PayPal. This hoax starts with […]… Read More