Observability pipelines allow you to monitor and secure your running state when transferring data from your infrastructure and applications. This eBook introduces you to the concept of observability pipelines, which can help slash costs, improve performance, get the right data, to the right destinations, in the right...
The inevitable digital transformation was accelerated by the pandemic. Before 2020, remote work was reserved for a select few and generally not encouraged. According to Forrester, the number of permanent, full-time remote workers is expected to increase by 300% or more from pre-pandemic levels. Global Workplace...
Network automation initiatives can help improve compliance, but how do you make sure the automation reduces—rather than increases—your organization's risks? This whitepaper examines how enterprises can build a network automation initiative that improves compliance and reduces risk.
Get guidance on how to...
VMware Carbon Black recently released its latest Global Threat Report, which focuses on the extended enterprise under threat. James Alliband discusses the findings and how enterprises can improve visibility, detection and containment.
Three things are increasingly common among corporate software engineering teams: they seek faster innovation, they seek improved security, and they utilize a massive volume of open source libraries. If any of these factors apply to you, you'll want to read this report.
Download this report to learn:
FireEye researchers and CISA are warning about a critical vulnerability that could allow an attacker to gain remote access to compromised IoT devices, such as connected security cameras, according to a report. The flaw could affect millions of connected devices.
T-Mobile USA says it is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. The person who claims responsibility for the alleged breach says T-Mobile misconfigured a Gateway GPRS Support Node.
Security researchers are tracking several ransomware gangs that are attempting to exploit a series of bugs in Microsoft Windows collectively called "PrintNightmare." Meanwhile, Microsoft has published an out-of-band alert about another zero-day flaw related to the PrintNightmare vulnerabilities.
Mark Ballister, CISO of the University of Rochester Medical Center and Jon Moore, chief risk officer of consulting firm Clearwater, discuss how the medical center's security risk management program has evolved since carrying out a HIPAA corrective action plan after two data breaches.
The recent ransomware attack that disrupted Scripps Health's IT systems and patient care for nearly a month has so far cost the San Diego-based organization nearly $113 million, including $91.6 million in lost revenue, according to a financial report the nonprofit entity filed this week.
This edition of the ISMG Security Report offers an analysis of how tractors manufactured by John Deere are at risk of being hacked. Also featured: a description of the infrastructure bill passed by the Senate that would boost cybersecurity funding and an update on the reboot of the AlphaBay darknet market.
Security operations focus an organization’s efforts around threat prevention, detection, and response. This then depends upon effective data collection, processing, and analysis, followed by data-driven decision making.
While organizations have years of experience in these areas, security operations processes and...
OT and IoT devices can pose patient safety concerns in healthcare environments, says Chris Frenz, an IT security leader of Mount Sinai South Nassau, a 455-bed teaching hospital in New York. He discusses mitigating the risks.