Information Security Spending: Don’t Be Fooled by Overconfidence

The New Stack

Spending on information security continues to increase, but those gains may decelerate as companies become more confident in their security posture. Sentiment about security may be due to increased spending in previous years.

Backups | Roadmap to Securing Your Infrastructure

Linux Academy

As information security professionals, it may not be our job to manage system backups, but it is our job to realize the importance backups have in the realm of information security. From a security standpoint, what should we consider when looking at backups?

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

March is upon us as we continue with our roadmap to securing your infrastructure. Hopefully, February’s posts reignited your passion for security. In the information security industry, one thing we cannot do is become stagnant. The security mindset.

Why “Build or Buy?” Is the Wrong Question for Analytics

What’s more, they gain the security of working with. infrastructure isn’t set up to scale with increased. informed decisions. workflows and security models. WHY “BUILD OR BUY?” IS THE WRONG QUESTION FOR ANALYTICS Introduction.1 When to Build Your Own Analytics.

Roadmap to Securing Your Infrastructure: Intro

Linux Academy

This is the year we take information security to the next level. The next level is taking a journey with me throughout 2019 to discuss many different ways you can increase the security of your infrastructure. Each week, we’ll be posting about options to secure your infrastructure, and once monthly we’ll be posting a video to go along with one of the months topics. Securing Your Infrastructure. Holy cow — it’s 2019!

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

The Bill Codifying The New Cybersecurity and Infrastructure Security Agency Is Short and Sweet

CTOvision

The Cybersecurity and Infrastructure Security Agency (CISA) was created out of several existing organizations within the DHS. CTO Cyber Security NewsThe nation has a new federal agency. The CISA was codified by a law signed by the President on 16 November 2018. I read what DHS said about CISA (see more here). Then thought I should spend a […].

User Account Review | Roadmap to Securing Your Infrastructure

Linux Academy

One of the topics you may not often think of as being all that important to security is user accounts on systems. At a previous employer, I performed many security-focused audits for organizations needing to meet regulatory compliance. There are other user account-related topics we’ll cover in future posts, but this one is low-hanging fruit in the efforts to securing our infrastructure.

Infrastructure as Code: Evolution and Practice

The New Stack

Sean is a seasoned systems operator and software developer with a decade of experience in automating infrastructure. As infrastructure has evolved and matured over the last decade, the way in which we build and deploy that infrastructure has — for the most part — kept pace.

Customers Need a Hyper-Converged Infrastructure For a Resilient, Adaptive Cybersecurity Strategy – Partners Can Help

Armughan Ahmad - Dell EMC

In 2017, there were more than 5,000 publicly disclosed data breaches, according to Risk-Based Security. The implementation of sweeping regulations, as well as the damaging effects of financial penalties and brand reputation, have elevated the need to protect and secure data.

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

As Dave Aitel, former NSA cybersecurity analyst and the current chief security technical officer of cybersecurity company Cyxtera tells The Parallax, the details of the indictment indicate the high level of confidence the Justice Department has in its charges. Regardless of U.S.

Self-testing infrastructure-as-code

OpenCredo

Version control brings the benefit that not only can you see what the infrastructure was, but you can also get reviews of changes by your peers before the change is made live; known to most developers as Pull Request (PR) reviews.

NSA leader to hackers: Cybersecurity’s a team sport

The Parallax

LAS VEGAS—It wasn’t so long ago that DefCon attendees enthusiastically engaged in the conference pastime “ Spot the Fed ”—clearly separating themselves from employees of federal organizations like the National Security Agency, if not demonizing them. Cybersecurity really is a team sport.

Sport 149

Patch Management | Roadmap to Securing Your Infrastructure

Linux Academy

It’s also a good idea to keep up with InfoSec news so you know sooner rather than later when new serious vulnerabilities are discovered and patched, ensuring you keep your infrastructure secure! Bonus: You may need to get management’s buy-in to purchase security solutions, such as a patch management product. The post Patch Management | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog.

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […]. Blockchain and Cryptocurrency CTO News

Vulnerability Scanning – Roadmap to Securing Your Infrastructure

Linux Academy

As we continue down the path to successfully securing our infrastructure, we come to vulnerability scanning. A vulnerability scan simply scans for security flaws in systems and devices known as vulnerabilities and reports them. Vulnerability scanning allows you to see what vulnerabilities are in your infrastructure. New vulnerabilities are identified daily and it’s our duty to stay on top of keeping our infrastructure safe!

Security Awareness Training | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to the blog series dedicated to helping you secure your infrastructure in 2019. You’re here, that means you’re interested in what you can do to better secure your environment and that’s awesome! The risk of not providing security awareness training.

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

Continuous Delusion at the Infrastructure Layer

CloudScaling

It has largely ignored the infrastructure layer. Infrastructure is more sensitive to a catastrophic change because if the infrastructure fails, everything fails. In effect, the “blast radius” of infrastructure failures is significantly larger than that of application failures.

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure

CTOvision

The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. CTO Cyber Security Cyber War News

How Firecracker Is Going to Set Modern Infrastructure on Fire

The New Stack

One of the most exciting announcements from last week’s AWS re:Invent was Firecracker — an open source project that delivers the speed of containers with the security of VMs. As someone with a keen interest in the evolution of modern infrastructure, I am intrigued by Firecracker.

Consistent infrastructure: The secret superpower of the hybrid cloud

CTOvision

There is a good reason that experts cite the hybrid cloud as the preferred strategy for enterprise cloud adoption: Most organizations can benefit from the security and control of a dedicated private cloud combined with the scalability and reliability of the public cloud.

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. And not all federal cybersecurity decisions this year were necessarily harmful to consumers.

How Hyperconverged Technologies Simplify the Management of your Infrastructure Stack

Megaport

This movement has brought with it a shift in focus from managing infrastructure to managing applications. These are the challenges that have been the catalyst for hyperconverged infrastructure technologies to emerge. Hyperconverged Infrastructure Technologies.

The Case for Minimalist Infrastructure

Stacks on Stacks

At Stackery , we believe in helping people create the most minimal application infrastructure possible. In addition, we had staging and dev environments with similar quantities of infrastructure. We had spent much more people-hours on security and ops than on development.

Three Key Steps to Help Protect National Infrastructure

SecureWorks

Attacks on the national critical infrastructure are on the rise. Now it’s time for their security maturity rise to the challenge. Category: Leadership Insights Attacks on the national critical infrastructure are on the rise. Now it’s time for their security maturity rise to the challenge. Leadership

How Data Inspires Building a Scalable, Resilient and Secure Cloud Infrastructure At Netflix

Netflix TechBlog

Central engineering teams enable this operational model by reducing the cognitive burden on innovation teams through solutions related to securing, scaling and strengthening (resilience) the infrastructure. All these micro-services are currently operated in AWS cloud infrastructure.

Digital Transformation Requires an Agile Storage Infrastructure

Hu's Place - HitachiVantara

With the explosion of data and the increasing demands on that data, data centers must focus more on the data and the information that can be derived from it than the storage infrastructure that supports it. However, the storage infrastructure, is still very important.

Snowball EC2 + vSphere: 2nd Generation Hybrid Infrastructure

Vidder

When combined with a SDP-based Zero Trust Network, enterprises now have an infrastructure solution that offers a better cost structure, agility and security than any other design. AWS secure enclave application securityThe recent announcement by AWS of a physical Snowball EC2 compute platform represents a significant step forward in hybrid cloud/data center computing.

The Security – Automation Tango: Simple Approaches to a Robust IT Infrastructure Security

Armughan Ahmad - Dell EMC

Apparently, so does a secure IT infrastructure. A key pre-requisite for a modern datacenter is a robust infrastructure security. And, for a robust security to be effective, it needs to be intelligently automated. You need two to Tango.

AWS Snowball Edge And Hyper Converged Infrastructure Will Revolutionize Global Enterprises

CTOvision

When combined with a Hyper Converged Infrastructure (HCI) super computer and Zero Trust Network, enterprises across a broad range of vertical markets can transform their operational model. Big Data and Analytics Cloud Computing CTO Cyber Security News Amazon AWS hyper converged infrastructure vmwareThe recent announcement by Amazon AWS of a portable Snowball EC2 compute platform represents a significant advance in hybrid cloud/data center computing.

Nlyte: For Data Center Infrastructure Management

CTOvision

For an overview of Nlyte see the video of the video at this link and embedded below: Nlyte provides Data Center Infrastructure Management (DCIM) and Data Center Service Management Solutions (DCSM). Company Infrastructure Companies Security Companies Data center Nlyte

Use Hyper-Converged Infrastructure to Simplify IoT Projects at the Edge

The New Stack

Rohit attended the Worcester Polytechnic Institute where he acquired a bachelor's degree in Management Information Systems. Spend time focusing on business logic and less time managing infrastructure. Rohit Goyal.

DHS opens new cybersecurity center to protect infrastructure, Amazon works issues of Rekognition, self-assessment to help against data breaches, Samsung’s IoT hub open to attacks

CTOvision

The following are some of the cybersecurity topics we are tracking: At DHS Announcement, Pence Blames Russia for 2016 Election Interference, Vows to Tighten Cybersecurity The United States government is preparing a major cybersecurity rehaul to protect key public infrastructure. US Department of Homeland Security announced on Tuesday the creation of a new center aimed [.]. CTO Cyber Security Cyber War News

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Hear from one of our Security Training Architects, Bob Salmans, below and see why he loves working at Linux Academy. Security Training Architect. I create training courses related to information security.

Securing voting machines means raising funds

The Parallax

When the Senate failed to move the Secure Elections Act forward in August because of White House concerns over states’ rights , coupled with funding concerns, the United States lost its best chance this year of taking steps toward patching voting machines. Why current funding to secure U.S.

Report 192

Zayo’s Infrastructure Supports UCHealth’s Advances in Patient Care

Zayo

But these technologies are bandwidth-intensive, and security, reliability and latency are critical when lives are on the line. UCHealth — a top-ranked hospital and healthcare provider in Colorado — is on the front line of healthcare with a high-performance, highly secure network.

The Greatest Danger to Our Infrastructure Might Be Physical

CTOvision

In addition to intentional damage, infrastructure is vulnerable to accidents, as well as natural wear and tear. The importance of our infrastructure can't be underestimated, and a death caused by an accident or vandalism is beyond any dollar figure. CTO Cyber Security FBI

Auditing Microsoft Security Compliance Toolkit Baselines

Tenable

Security baselines are helpful but to be sure of their effectiveness you need to perform regular audits. and Nessus Professional to audit the security baselines included within the Microsoft Security Compliance Toolkit. What is Microsoft Security Compliance Toolkit?