Tag: Designing
-
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Imagine this… You arrive at work to a chaotic …
-
Designing a Security Strategy for Defending Multicloud Architectures
Complex security issues arise when different clouds and computing models interact. The Growing Trend of Multicloud in Business Most large …
-
Designing Your Threat Hunting Framework from Scratch – Core Essentials
A threat hunting framework is a collation of data-driven adversarial scenarios, backed up by hypothetical, field-tested, or time-honored …
-
Designing Tabletop Exercises That Actually Thwart Attacks
Have you ever wondered how they design blue team exercises? One ransomware and cyber extortion simulation demonstrates the best …
-
Designing a Proactive Ransomware Playbook for Today’s Threat Landscape
By Paul Bird, Chief Technology Security Office, Qualys Ransomware attacks are among the most significant cyber-threats facing organizations …
-
Designing a BYOD Approach for the Future
Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto …
-
ORNL’s Gina Accawi: Designing Software for Manufacturing Cybersecurity
May 27, 2021 — As a computer engineer at Oak Ridge National Laboratory, Gina Accawi has long been the quiet and steady force behind some …
-
5 minutes with Ian Pratt – Designing enterprise-level security for the work from anywhere world, from the hardware up
COVID-19 massively accelerated cyber risk, with new vulnerabilities cropping up every day in both known and novel forms. Several factors …
-
Presentation: Designing Secure Architectures the Modern Way, Regardless of Stack
Eugene Pilyankevich shares his experience of implementing sophisticated defenses in constrained environments – ranging from protecting …
-
Designing DDoS Mitigation Solutions for Simplicity & Speed
Given the key aspect of DDoS mitigation is accurate detection and fast mitigation, in some scenarios over designing the solution can lead …
-
A Flexible Backbone: Designing a Computing Infrastructure for Speed, Security, and Innovation
Pressured by the successes of digital challengers – startups and nimble smaller organizations that are unburdened by legacy technology …
-
Designing Firmware Resilience for 3 Top Attack Vectors
Smart hackers always want to take the least cumbersome route. Historically, that meant targeting vulnerabilities in software, and in the …
●●●