Remove 2018 Remove Blog Remove Security Remove Systems Administration
article thumbnail

To Identity and Beyond: Identity and Access Lessons from the NASA Cybersecurity Report

Saviynt

On June 18, 2019, the Office of the Inspector General (OIG), Office of Audits released the Cybersecurity Management and Oversight at the Jet Propulsion Laboratory report. The most recent one, in April 2018, arose from a compromised account belonging to an external user. Ineffective IT Security Waiver Process.

article thumbnail

How COVID-19 Response Is Expanding the Cyberattack Surface

Tenable

As organizations rapidly move to a remote-work model in response to COVID-19, cybersecurity professionals are facing a sudden expansion of the attack surface. While connecting to work remotely comes with its own set of security issues, the applications installed on these devices are not without their own flaws.

LAN 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Month of July: Monthly Update 7-1-2019

Linux Academy

The study group goes over what Symantec saw as the biggest threat vulnerabilities in 2018. Secure Socket Layer (SSL) Fundamentals – This course is designed to give you a high-level understanding of how to implement and maintain an environment that supports SSL and TLS (Transport Layer Security). Early Access Courses.

Linux 60
article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

Rachel Stephens provides two fascinating pieces of the puzzle in a recent article on the RedMonk blog , but those pieces don’t fit together exactly. Unfortunately, security problems never really go away; we expect software supply chain security to remain an important issue for the foreseeable (and unforeseeable) future.

Trends 119