article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. It seeks to establish and monitor your company’s cybersecurity risk management strategy, expectations, and policy. The CSF 2.0

article thumbnail

BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity

The Last Watchdog

There’s a tiny bit more to Cisco’s acquisition of Splunk than just a lumbering hardware giant striving to secure a firmer foothold in the software business. As a leading supplier of advanced security information and event management ( SIEM ) technology, Splunk happens to find itself in the thick of a tectonic shift.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training and testing), it’s important to make sure that the time and investment are well spent. How to Choose a Security Certification.

article thumbnail

Why Businesses are Turning to Managed Cloudflare Services

Adapture

The team finds areas for improvements and backs up the configuration to ensure data recovery in case of disaster. By knowing the latest trends in Cloudflare and in cyberattacks, managed service providers ensure security and continuity. For overworked cybersecurity teams, keeping daily operations going can be more than enough.

article thumbnail

Excellent Write-up of the SolarWinds Security Breach

Schneier on Security

Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.

Security 122
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Teslas have plenty of vulnerabilities, as cybersecurity researchers have recently discovered. Make sure your security and IT teams are aware of every connected device so your business knows how to best protect its networks and sensitive data from vulnerabilities and threat actors.

IoT 125
article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

RSA Conference 2023: Meet Thales Where the World Talks Security! In cybersecurity, we are a community of many. Meet us at Booth #N-5369 for demonstrations on data security, customer and workforce identity, and post quantum cryptography – just to name a few. This year’s theme “ Stronger Together ” echoes our company culture.