article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used as a case study. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Next Steps for the Cybersecurity Framework (vormetric.com). legalzoom.com).

article thumbnail

The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable

Tenable

Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you can implement it today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO

The proliferation of cyber threats has become so great that earlier this year the Australian government issued the recommendation that organisations “ urgently ” adopt an enhanced cyber security posture. Cyber security attacks are an inevitability that all businesses should now be prepared for.

article thumbnail

Cybersecurity Snapshot: For Strong Cloud Security, Focus on Configuration

Tenable

Check out the NCSC’s advice about proper configuration in cloud security. Also, don’t miss OWASP’s revised list of top API security risks. 1 – NCSC: Configuration is key for cloud security The U.K.’s 1 – NCSC: Configuration is key for cloud security The U.K.’s Plus, a detailed guide about LockBit ransomware.

Cloud 52
article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Also, how to assess the cybersecurity capabilities of a generative AI LLM. 1 - NIST’s Cybersecurity Framework 2.0 1 - NIST’s Cybersecurity Framework 2.0 The Cybersecurity Framework at 10.and And the most prevalent malware in Q4. And much more!

article thumbnail

Key skills tech leaders need to secure a board seat

CIO

Cybersecurity oversight is a shared responsibility across the whole board. Therefore, we have programs to educate all directors on cybersecurity. We’ve also published, in partnership with the Internet Security Alliance (ISA), the 2023 Director’s Handbook on Cyber-Risk Oversight. It’s a win-win.

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.