Cybercrime has only increased and GDPR has yet to be effective. More and more, traditional crime is moving online to the internet because it’s far easier to get away with.
The laws in place to help regulate society, such as Money Laundering and CCTV Regulations, just aren’t on the internet. That’s why at the end of the day, the internet is the New Frontier:
It’s the Wild, Wild West, where the rules don’t apply.
Luckily, a hero comes proverbially roaring in to save the...
How do you ensure the security of a third of America’s web traffic?
By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast.
I recently got together with Will Bengtson, a security researcher with over a decade of experience in cybersecurity who works at Netflix.
“The biggest thing for me is that we have a lot of accounts, a lot of instances, a lot of change in our...
Too many IT professionals believe that cloud platforms, such as AWS or Google Cloud, handle any cloud-related security.
Unfortunately, far too many are caught off guard when they learn that the security of these web services is limited. Yes, you are purchasing a service from them, but the truth is, IT security within a shared API is a shared responsibility.
Brad Geesaman sees it far too often. He’s been in IT security and infrastructure for over 15 years, working with Symantec, Blackfin,...
This will be used for iTunes and other players where the episode appears.
It should be, ideally, no longer than three paragraphs.
And should include a concise summary of the episode, complete with guest name and position/qualifications.
Case studies show that more than half of the traffic on the dark web is illicit, and even the anonymized licit data has no place on the company network.
In this episode we talked with Mark Towler, Senior Product Marketing Manager at Ipswitch, and Jim Cashman, Principal Product Manager at Ipswitch and Product Owner of WhatsUp Gold, about the challenges of dark web traffic and how a new feature of WhatsUp Gold gives IT teams a tool to address this problem.
How would you like to walk into an HIPAA audit? Most will go in wondering - or worrying - if the security measures in place reflect their company’s due diligence to protect their ePHI (electronic protected health information). Others will have the forethought to be proactive in their situation and know they have done what is necessary to protect the information for which they are responsible. We want you to be the latter.
The European Union GDPR laws went into effect May 25th. The U.S. is not far behind, and just last week California passed its own group of privacy protection laws meant to protect California residents from the mishandling of their personal information.
As companies like Facebook and Equifax who have been front and center for the mismanagement of personal information for millions of people, what do new privacy laws mean for individuals and businesses?
In this episode Greg and Jeff speak...
Do the headlines about data breaches and information hacks have you worried, but you don’t know where to turn?
If you’re afraid of having a cybersecurity “guru” take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
Hate seeing that troubleshoot error pop up?
Wouldn’t it be a lot less taxing when you have the problem identify itself with solutions, instead of you scrambling to fix the issue.
Reactive mode can be a stressful operation mode that no company wants to work in, but what if we can go from reactive to predictive mode.
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
Phishing attacks are becoming inevitable, but as a preventative measure - we need to learn what our risk factors are and make it harder for hackers to log into our accounts.
Nothing frustrates and cripples IT more than individuals in varying departments going rogue. Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi off network. Sara from finance uses non-approved cloud storage for personal info of employees, exposing the data. Then Larry uses his own home laptop because the work computer has too many restrictions.
All this and more causes headache after headache for IT. The problems abound, causing security threats...
With so many available languages, knowing which one to choose for automation can be overwhelming.
In this interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.