Microprocessor makers Intel, ARM and AMD, as well as operating system and software developers and makers of smartphones and other devices, are rushing to prep, test and ship fixes for the serious CPU flaws exploitable via Meltdown and Spectre attacks.
"Replace CPU hardware" might be the only full solution listed by CERT/CC for serious flaws in microprocessors that run millions of PCs, cloud services, servers, smartphones and other devices. Thankfully, many security experts believe patches and workarounds will mostly suffice.
As the healthcare sector implements a variety of new applications and increasingly moves to the cloud, it has a fresh opportunity to address security, says Daniel Bowden, CISO at Sentara Healthcare, who discusses best practices.
In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks or even months as they gather intel and prepare to strike. Sixty-one...
"Machines" as we know them are going through an identity crisis. Our increased dependence on them is so profound that even the definition of machine is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly, but this is outstripped by the number of...
When you launch a VDI or RDSH initiative, you are going to impact the daily lives of people throughout your organization. You can't afford to make mistakes. This reality points to the need to avoid the common pitfalls of VDI and RDSH projects.
Download this whitepaper and learn how to:
Put together the right...
The consumerization of the enterprise represents both a challenge and an opportunity for IT. Implementing a digital workspace solution can help IT harness the rapid changes brought about by consumerization and address the needs of the full range of users and use cases within the business.
Download this whitepaper...
IT's inability to support consumer-like user experience not only hinders productivity, but also presents risk to corporate data as users are likely to seek out alternative solutions or loopholes.
Download this whitepaper and learn how:
"Shadow IT" can be turned into a positive for your organization;
Mobile...
In an era where users are working simultaneously across mobile,
social and cloud applications and platforms, organizations need
to deploy identity and access management solutions that can scale
and adapt quickly. That's where IDaaS comes in. It simplifies
that onboard experience for the employee and gives...
There is a lot of frightening rhetoric coming out of the IT-security industry regarding the GDPR data protection reform adopted by the European Parliament and going into effect on May 25th, 2018. These issues of data privacy and security seem especially thorny in today's virtualized and cloud environments where...
U.S. healthcare entities need to keep security top of mind if they use offshore services to handle protected health information, security experts say, pointing to specific steps to take.
In an era where users are working simultaneously across mobile, social and cloud applications and platforms, organizations need to deploy identity and access management solutions that can scale and adapt quickly. IBM's Sean Brown describes the rise of Identity as a Service.
Parliament to the populace: Do as we say, not as we do. How else to characterize multiple U.K. lawmakers' flagrant disregard for the data privacy laws that they themselves voted into effect?
Centralizing cloud security through security brokers improves data protection and can enable organizations to use more applications, says Gleb Evfarestov of Bitglass.
Traditional identity and access management (IAM) controls, though extensive, are static. Once a malicious user gains access, they are free to exploit the system up to the extent of the account's set privileges.
Download this whitepaper and learn how an identity-centric approach to security solves this problem...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.