Your business operates in a world where there is an incredibly high demand for cybersecurity talent. Now with unemployment at a 50 year low there are no indications that anything can be done to dramatically increase the pool of cybersecurity talent. Enterprise grade cybersecurity requires enterprise grade experience. How do you get that in today’s business environment? For … [Read more...] about CISO-as-a-Service: When your enterprise needs cybersecurity expertise on demand
News Analysis And Context
CTOvision provides original news, analysis and reporting on topics of interest to the enterprise IT professional. We focus on providing insights that the enterprise CTO, CIO, CISO and Data Scientist need in order to succeed, including providing advanced warning of emerging technologies that can change their business processes. We track major events in the IT space.
A vulnerability in legacy Iomega and LenovoEMC network-attached storage (NAS) devices has led to many terabytes of potentially sensitive data being accessible to anyone via the Internet. Iomega Corporation was acquired in 2008 by EMC. In 2013, Iomega became LenovoEMC – a joint venture between Lenovo and EMC Corporation – and Iomega’s products were rebranded under the new name. … [Read more...] about Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet
Embattled cryptocurrency exchange Bitpoint has revealed that roughly half of its 110,000 users were affected by last week’s $3.02 billion yen ($28 million) hack, reports The Mainchi. Speaking at a Tokyo press conference, Bitpoint president Genki Oda noted that of the 3.02 billion yen stolen, customers owned 2.06 billion yen ($19 million), while 960 million yen ($8.9 million) … [Read more...] about Does this put downward pressure on Bitcoin prices? 55,000 cryptocurrency users affected in Bitpoint’s $28 million hack
Read Brian Remmel explain how network security complexity can hamper the functioning of organizations on Cisco Blog : At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks. They do this by setting security policies that detail … [Read more...] about How Is Network Security Complexity Holding You Back?
Most infosec forensics investigators walk a fine line. They must adhere to specific institutional processes, which, in many cases, are state and federal requirements. But they must also use a certain amount of pragmatism since no two investigations are exactly alike. So while there may be a corporate best practice of collecting log files from all systems, that approach doesn't … [Read more...] about For Your Awareness: The 10 Essentials of Infosec Forensics