Similar Posts
The Ultimate Cyber Conversation with the CyberHub Engage Podcast
ByKayne
Join host James Azar and me as we talk about workforce development, diversity, the Internet of Things, and the role of government in technology.
How to ensure virtual roadshows, negotiations are safe amid COVID-19
ByKayne
Companies should record video calls when doing so poses an obvious business benefit, the participants have consented to it, and there are adequate controls in place to limit access to the resulting video to only authorized parties, Kayne McGladrey, security architect at cybersecurity consultancy Ascent Solutions, said.
To ensure accessibility,companies should also strongly consider using closed captioning on call recordings, McGladrey added.
Open Source Mindset Bolsters Hybrid Cloud Strategies
ByKayne
Linux continues to be a popular deployment choice for new virtual machines on Azure. “Organizations moving legacy on-premises Linux servers to the cloud can quickly gain the benefits of robust disaster recovery and security without needing to change platforms or applications”
Drafting Compliance S1, E2: The FedRAMP Authorization Boundary
ByKayne
Hosts Kayne and Tom talk about how to create the Authorization Boundary, a cornerstone of the System Security Plan (SSP) as part of FedRAMP certification. Includes beer tasting notes for Black Butte Porter.
Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges
ByKayne
Adopting zero trust strategies are a potential solution to mitigate the challenges of ransomware, bulk intelligence data collection, and technical threats to cryptocurrency. As zero trust is predicated on a continuous authentication of user and device identities based on prior known-good behaviors, unusual events from previously unknown devices will be far less frequent and the telemetry far more obvious for investigation by blue teams.
It’s Time to Regard Cybersecurity as Human Safety
ByKayne
Cultural change takes time and is a journey, not a destination. Senior leaders, managers, and individual contributors all have a role and responsibility in ensuring that manufacturing companies stay safe from cybersecurity risks. Elevating cyber risks to the same level as safety risks will help companies to comprehensively understand and manage their risks now and in the coming years.