The evolution from BEC to BCC
Cyber Talk
by slandau
2d ago
David Meister is a valued technology expert with over 15 years of experience in technical and consultancy roles across a range of technologies, including networking, telecommunications, infrastructure, and cyber security. After starting his career as a network engineer, David’s passion for using technology to solve problems led him through various roles, including engineer, technical manager, consultant, and sales professional. As a consultant, David designed technology solutions for organizations in various industries, such as not-for-profit, engineering, mining, and financial services. David ..read more
Visit website
Top 10 things CISOs should know about AI security tools
Cyber Talk
by slandau
2d ago
EXECUTIVE SUMMARY: As reported by executives, the top tangible benefit of AI is cyber security and risk management optimization. Right now, nearly 70% of enterprises say that they cannot effectively respond to cyber threats without AI security tools. However, despite the decidedly viable and valuable AI-based security opportunities that exist, sensationalism continues to obscure how AI security tools can truly advance cyber security initiatives. In this article, explore 10 essential ways in which AI-powered tools can supercharge your cyber security systems and help you fight back against the m ..read more
Visit website
Secure out-of-band console and power management for Check Point security gateways
Cyber Talk
by slandau
4d ago
Contributed by WTI as part of Check Point’s CPX silver-level partner sponsorship opportunity. WTI is an industry leader in out-of-band network management. Nobody has time to drive to a site when an ISP drops service or you simply need to reconfigure and/or reboot a switch, router or firewall. Your time is too valuable not to have an out-of-band solution in place. WTI out-of-band solutions comes with a cellular connect and fallback option that gives you secure remote access to console ports as well as control of individual power outlets when your network services are disrupted. WTI out-of-band ..read more
Visit website
The MSSP perspective: CISO insights into stronger security
Cyber Talk
by slandau
1w ago
Gary Landau has been leading IT and information security teams for over 25 years as part of startups as well as large global organizations. He is currently a Virtual Field CISO with Unisys Security Services, where he supports companies in many different industries. His mantra is “keep making it better” and he is passionate about continuously improving system reliability, performance, and security. In this interview, Gary Landau unpacks valuable ideas, processes and solutions that can help businesses succeed in becoming more cyber secure. This is a fascinating read for any security professiona ..read more
Visit website
10 must-know benefits of cyber security managed services (MSSPs)
Cyber Talk
by slandau
1w ago
EXECUTIVE SUMMARY: Three quarters of CEOs (74%) are concerned about their business’s ability to avert or limit damage from a cyber attack. Although most executives recognize the role of cyber security in maintaining organizational stability, some are instructing security admins to delay cyber security maintenance and upgrades due to resource constraints. In the long run, this can imperil a business. For organizations that are struggling to prevent threats, to implement innovative technologies and to reduce capital expenditures, managed security service providers (MSSPs) represent a pragmatic a ..read more
Visit website
Why enterprises are going hybrid and returning to colo!
Cyber Talk
by slandau
1w ago
By Ervin Suarez, Security Engineer for Cable and Colocation Accounts, Check Point Software Technologies. I’ve been closely observing a fascinating shift in the IT landscape and wanted to share some insights with all of you, especially given how these changes could impact our industry. Lately, there’s been a noticeable shift among enterprises back towards colocation (colo) services, while they’ve simultaneously embraced hybrid cloud models. This trend is intriguing and speaks volumes about the evolving needs and strategies of businesses when it comes to managing IT infrastructure. Why the shift ..read more
Visit website
Is open source under siege?
Cyber Talk
by slandau
1w ago
EXECUTIVE SUMMARY: The recent discovery of a backdoor in XZ Utils, a core compression utility embedded in countless Linux systems, has sent shockwaves through the cyber security community. As journalist Kevin Roose of the New York Times pointed out in relation to the XZ Utils fiasco, in some places, the internet is held together by the digital equivalent of bubble gum and Scotch tape, and the inherent fragility is a draw for cyber criminals. According to today’s joint alert issued by the Open Source Security Foundation (OpenSSF) and the OpenJS Foundation, the XZ Utils breach might not be an is ..read more
Visit website
How artificial intelligence is revolutionizing cyber security
Cyber Talk
by gmack
2w ago
By Shira Landau, Editor-in-Chief, CyberTalk.org. In recent years, artificial intelligence (AI) has become one of the most sure-fire and strategic tools available for cyber security professionals. Due to the increasing sophistication of cyber attacks, cyber security experts have broadly turned to AI in order to enhance abilities to detect and prevent cyber threats. As it stands, nearly 50% of enterprises are already using a combination of artificial intelligence and machine learning tools to improve cyber security outcomes, and 92% of organizations plan to adopt these types of tools in the futu ..read more
Visit website
Leveraging the power of AI and cloud computing
Cyber Talk
by slandau
2w ago
EXECUTIVE SUMMARY: As cyber adversaries diversify their tactics and devise increasingly sophisticated attack methods, legacy cyber security tools may not be competent enough to block threats. As every cyber security professional knows, novel and sophisticated threats are among the most difficult to prevent or defend against. That said, the convergence of artificial intelligence (AI) and cloud computing might just be a game-changer. Staying ahead of sophisticated threats requires new thinking, new strategies and sometimes, new tools. In this article, explore the benefits of AI and cloud. See ho ..read more
Visit website
How artificial intelligence is revolutionizing cyber security
Cyber Talk
by slandau
2w ago
By Shira Landau, Editor-in-Chief, CyberTalk.org. In recent years, artificial intelligence (AI) has become one of the most sure-fire and strategic tools available for cyber security professionals. Due to the increasing sophistication of cyber attacks, cyber security experts have broadly turned to AI in order to enhance abilities to detect and prevent cyber threats. As it stands, nearly 50% of enterprises are already using a combination of artificial intelligence and machine learning tools to improve cyber security outcomes, and 92% of organizations plan to adopt these types of tools in the futu ..read more
Visit website

Follow Cyber Talk on FeedSpot

Continue with Google
Continue with Apple
OR