Article: Asset Management – Back To The Roots - published over 3 years ago. Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c... https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/ Published: 2021 03 31 13:47:25 Received: 2024 04 28 00:23:13 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago. Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal... https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ Published: 2021 06 08 16:05:55 Received: 2024 04 28 00:23:12 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago. Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio... https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ Published: 2021 06 12 20:00:24 Received: 2024 04 28 00:23:12 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: Old Systems are Creating Cybersecurity Challenges for Healthcare Orgs - MarketScale - published 6 months ago. Content: Davy Wittock, Chief Business Officer at Flux Technologies, discusses cybersecurity challenges facing healthcare's digital landscape. https://marketscale.com/industries/software-and-technology/old-systems-are-creating-cybersecurity-challenges-for-healthcare-orgs/ Published: 2024 04 27 15:01:54 Received: 2024 04 28 00:03:43 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
Article: Centre Wants Electronic Component Makers To Ensure Nation's Security Interests: IT Secy - published 6 months ago. Content: Cybersecurity India. PTI. Published on: 27 Apr 2024, 5:47 am. Electronic ... "We spoke about this briefly (in the past) and how cyber security is ... https://business.outlookindia.com/economy-and-policy/centre-wants-electronic-component-makers-to-ensure-nations-security-interests-it-secy Published: 2024 04 27 18:55:44 Received: 2024 04 28 00:03:41 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Article: Can Quantum Computing Affect Cyber Security? - Analytics Insight - published 6 months ago. Content: This article delves into the implications of quantum computing on cybersecurity, focusing on its potential effects on cryptography. https://www.analyticsinsight.net/can-quantum-computing-affect-cyber-security/ Published: 2024 04 27 20:33:54 Received: 2024 04 28 00:03:39 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Click to Open Code Editor