The world is going multi-cloud. The first thing to understand about this emerging strategy is that it’s very popular.
Netskope Threat Protection recently detected an interesting PDF decoy hosted in Google Drive. The PDF decoy was impersonating a law firm in Denver, CO. The PDF decoy linked to an Office 365 phishing page hosted in Azure blob storage.
Whether it’s a malicious cyber attack, or a complete system outage; when disaster hits your network the immediate priority is to maintain business operations and resolve the issue.
After years of deliberation, the GDPR is now a reality to businesses around the globe. Rather than simply seeing it as a necessary evil, we should remain mindful of the value to be gained from the regulation.
Has your business chosen an appropriate communication and file sharing tool that can be relied upon in the event of a complete network shutdown?
A vulnerability is an exploitable weakness in a system or product, or it could be a weakness through design or a business decision. For the top 10 worst vulnerabilities of 2018, we used the known vulnerabilities listed through the Common Vulnerabilities and Exposures (CVE) resource.
As a CISO, it’s likely that you often hear about what you should be doing to protect your systems and data better: Buy this software. Deploy that system. Use this service. Hire these people, etc..