Computol is a technology provider with nearly 40 years of experience
providing network management and data protection services. Today, the MSP
manages these services for more than 30 clients across the USA, protecting
29 TB of data in the cloud alone.
In order to exceed their clients' needs, Computol's team of IT...
One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and...
One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and...
Before public cloud services, large-scale computing infrastructure was expensive, hosted on-premises and reserved for big enterprises, governments, and universities. Now, anyone with a credit card can access an unlimited supply of cloud apps and computing power.
While cloud computing offers many benefits, its...
Creating a cybersecurity incident response plan is a fundamental requirement of any cybersecurity program - and a requirement of many global regulations, including GDPR and PCI DSS. During this workshop, Troutman Sanders' Sadia Mirza will discuss the benefits of table top exercises. She then will be joined by law...
Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to...
If your organization is in the early stages of your journey to find a vendor risk management (VRM) solution, a frequent challenge is that many teams are simultaneously educating themselves on what a vendor risk program necessitates while evaluating technology solutions to assist with the relevant decision-support...
Companies like yours spend millions of dollars each year assessing and mitigating threat vectors within the company. But when it comes to the management of third-party cyber risks, management and tracking typically follow archaic and highly manual processes. Despite its complexity, vendor risk management doesn't...
Regardless of industry or function, every company relies on an ecosystem of other providers to deliver goods and services. Suppliers and vendors, partners and affiliates, and even customers - collectively, third parties - form a strongly connected network that, while essential for business, introduces hidden...
You can't stop cyberattacks from happening altogether, but you can take proactive measures to better weather the storm and reduce the risk of damage. Among the keys to surviving a cyberattack is mitigating risk on the assets and the network layer. That includes knowing what and where your data resides in the network...
The abuse and/or misuse of privileged credentials plays a role in almost every cybersecurity breach incident today. With privileged access in hand. an attacker essentially becomes a malicious insider - and that's an alarming scenario for any IT professional, all the way up to the C-level and the Board.
Privileged...
What's hot on the cybersecurity legal front? For starters, in 2018, the U.S. Department of Justice indicted twice as many alleged state-sponsored attackers than it had ever indicted, says Kimberly Peretti of Alston & Bird.
Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. Cloud workloads are vulnerable to data breaches, account compromises, and resource exploitation.
Read Anatomy of a Cloud-Native Data Breach to follow the dissection of a...
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.