How to prioritise your cyber security investments in 2022
TEISS | Cracking Cyber Security
by Web Editor
2y ago
Every time the cyber threat landscape has changed, the standard response has been to add another layer to the security stack. The post How to prioritise your cyber security investments in 2022 appeared first on teiss ..read more
Visit website
Is FOMI keeping you up at night?
TEISS | Cracking Cyber Security
by Web Editor
2y ago
With Managed Detection and Response, organisations can move faster and more efficiently, targeting and heading threats off at the pass The post Is FOMI keeping you up at night? appeared first on teiss ..read more
Visit website
Critical Log4j vulnerability exposing enterprise systems to ransomware & RAT infection
TEISS | Cracking Cyber Security
by Jay Jay
2y ago
Log4J, an open source Apache logging framework that logs activity in applications, has been found featuring a serious vulnerability that allows malicious actors to plant a remote access trojan and also ransomware in enterprise servers. Log4j is a widely-used open source library written in Java script that logs activities in applications. It is used by […] The post Critical Log4j vulnerability exposing enterprise systems to ransomware & RAT infection appeared first on teiss ..read more
Visit website
The Expert View: How cloud migration projects are turning the CISO role into a strategic one
TEISS | Cracking Cyber Security
by Web Editor
2y ago
The cloud is a challenge for CISOs, especially if they aren’t included in migration plans early enough. How can they adopt a more strategic approach? The post The Expert View: How cloud migration projects are turning the CISO role into a strategic one appeared first on teiss ..read more
Visit website
The Expert View: How to report cyber-risk to the board
TEISS | Cracking Cyber Security
by Web Editor
2y ago
Boards are familiar with managing risk, but cyber-security can be complex. What is the best way to report cyber-risk so the board can take the right actions? The post The Expert View: How to report cyber-risk to the board appeared first on teiss ..read more
Visit website
You can’t fight what you can’t see
TEISS | Cracking Cyber Security
by Web Editor
2y ago
Making sure that IT teams have comprehensive visibility across systems will ensure that vulnerabilities are dealt with before they become issues The post You can’t fight what you can’t see appeared first on teiss ..read more
Visit website
Why proactive cyber defence is essential
TEISS | Cracking Cyber Security
by Web Editor
2y ago
So don't depend on detection alone; at the very least invest in detection + containment, and ideally map out a path to enhancing preventative controls. The post Why proactive cyber defence is essential appeared first on teiss ..read more
Visit website
Cyber and data security: are employees too ashamed to do the right thing?
TEISS | Cracking Cyber Security
by Web Editor
2y ago
When accidents happen, employees should be rewarded for coming forward, not shamed for being human The post Cyber and data security: are employees too ashamed to do the right thing? appeared first on teiss ..read more
Visit website
Conti ransomware strikes Nordic Choice Hotels, disrupts operations
TEISS | Cracking Cyber Security
by Jay Jay
2y ago
Nordic Choice Hotels recently suffered a cyber attack targeting its reservations system that potentially compromised the personal information of guests and details of their reservations. The post Conti ransomware strikes Nordic Choice Hotels, disrupts operations appeared first on teiss ..read more
Visit website
TeissTalk: Threat reconnaissance in your supply chain
TEISS | Cracking Cyber Security
by Web Editor
2y ago
teissTalk host Geoff White was joined by Danny Dresner, Professor of Cyber Security, University of Manchester and David Monnier, Fellow, Team Cymru The post teissTalk: Threat reconnaissance in your supply chain appeared first on teiss ..read more
Visit website

Follow TEISS | Cracking Cyber Security on FeedSpot

Continue with Google
Continue with Apple
OR