Remove directory
article thumbnail

10 essential tips for bolstering cloud security in your business

CIO

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Cloud 331
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The exposure of personal or sensitive information can lead to identity theft, phishing attacks, and other forms of cybercrime. There is no silver bullet in cybersecurity.

article thumbnail

Welcoming the next class of security leaders to the Modern CISO Network: Board Book

Lacework

I’m thrilled to introduce the second edition of the Modern CISO Network: Board Book , a directory of 216 experienced CISOs and cybersecurity leaders ready to share their expertise with corporate boards. We launched Secured By Women earlier this year to celebrate and recognize the exceptional women leaders in cybersecurity.

Network 128
article thumbnail

Securing Active Directory: 3 Ways to Close the No-Password Loophole

Tenable

Any Active Directory user can have their password requirements negated with a simple command. With Active Directory being around for so long, organizations and administrators get complacent with what they “think” is in place, which can lead to major security issues being exposed. Yes, it’s that simple! Yes, it’s that simple!

.Net 98
article thumbnail

Securing Azure Service Bus

Xebia

Security should be considered from the initial stages of designing a product rather than as an afterthought. Security requirements may vary depending on the use case; for instance, a banking solution would have different security needs compared to a solution for a local bakery. Initially, it was TLS 1.0,

Azure 162
article thumbnail

Retail Cybersecurity: The Importance of Compliance and Risk Management

Firemon

Retail Cybersecurity A Shift in Retail IT Security What’s at Stake? The Role of FireMon in Retail Cybersecurity Why Choose FireMon? Retailers , in particular, are attractive targets due to large repositories of customer data and often inadequate security measures. in late March of this year with 63 new requirements.

Retail 52