It’s undeniable that Machine Learning (ML) is changing the game for securing cloud infrastructure. Security vendors have rapidly adopted ML as part of their solutions, and for good reason: By analyzing massive quantities of data, it can help identify threats, speed incident response, and ease the burden on over-taxed security operations teams.
The Cybersecurity and Infrastructure Security Agency (CISA) released a draft of the Trusted Internet Connections (TIC) 3.0 Remote User Use Case and the draft National Cybersecurity Protection System (NCPS) Cloud Interface Reference Architecture (NCIRA): Volume 2.
Country-by-country analysis of major and emerging travel security risks
December 28, 2020
G4S published its Asia Emerging Risks report, which provides a comprehensive tactical overview of the preeminent risks impacting 19 of Asia’s top destinations to enable organizations to deploy risk-mitigation strategies to protect their employees and assets, especially during travel.
Following months of virtual meetings, testimony and study, U.S. Attorney General William P. Barr submitted the final report of the President’s Commission on Law Enforcement and the Administration of Justice to the White House. This report represents the first comprehensive study of law enforcement in more than 55 years.
The Department of Homeland Security (DHS) issued a business advisory to American businesses warning of risks associated with the use of data services and equipment from firms linked to the People’s Republic of China (PRC).
The Cybersecurity and Infrastructure Security Agency (CISA) is tracking a known compromise involving SolarWinds Orion products that are currently being exploited by a malicious actor. An advanced persistent threat (APT) actor is responsible for compromising the SolarWinds Orion software supply chain, as well as widespread abuse of commonly used authentication mechanisms. If left unchecked, this threat actor has the resources, patience, and expertise to resist eviction from compromised networks and continue to hold affected organizations at risk, says CISA.
Meet Ali Golshan, CTO and co-founder at StackRox, a Mountain View, Calif.-based leader in security for containers and Kubernetes. Prior to StackRox, he was the Founder & CTO of Cyphort (acquired by Juniper Networks) and led the company's product strategy and research initiatives. Previously, he worked as a security researcher and engineer at Microsoft and PwC. His career started in government, conducting security and vulnerability research for the intelligence community. Here, we talk to Golshan about the benefits of DevOps.
Modern cloud based security systems and surveillance solutions have come a long way. While some companies continue to rely on the older technology they are accustomed to, traditional systems are continually being phased out in favor of the flexibility offered by cloud-based solutions. Cloud-based systems have a myriad of advantages over older, on-premises security systems, and there is rarely an instance where an on-premises system is preferred over a cloud-based framework when installing a new setup.
Relying on outdated fraud prevention and identification measures will no longer cut it, and businesses that don’t adapt will lag. As people continue to work, collaborate and socialize via their mobile devices, businesses must equip themselves with technology and tools that will prioritize fraud prevention. If not, companies risk losing their customers to those who have invested in more robust solutions.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) published the Resilient Positioning, Navigation, and Timing (PNT) Conformance Framework today. PNT services, such as the Global Positioning System (GPS), is a national critical function that enables many applications within the critical infrastructure sectors. This framework will inform the design and adoption of resilient PNT systems and help critical infrastructure become more resilient to PNT disruptions, such as GPS jamming and spoofing.