It isn’t news that DevOps and IT security teams often struggle to align their departments and maintain a coherent balance between keeping a business secure and developing new applications to maintain customer interest. While security processes are a necessity, they can be deemed by DevOps teams to be manual and cumbersome, blocking the agility that makes them so effective in bringing their solutions to market. IT teams conversely feel their counterparts are prepared to sacrifice security in (...)
Accueil > Mots-clés > afficher un article sur la home > affiche
affiche
Articles
-
Security v Speed – why DevOps and security teams need to play nicely to stay productive
30 October 2018, by Reuven Harrison, CTO, Tufin Technologies -
Anne Frayssinet Trustech : Trustech permet de décrypter les tendances et d’explorer les enjeux en matière de Solutions d’identification et Paiements
21 novembre 2023, par Marc JacobPour sa 39ème édition Trustech, le rendez-vous annuel des professionnels du secteur des smartcards, des paiements innovants et des solutions d’identification se tiendra à Paris. Cetet année plus de 200 exposants seront présents.
-
Ian Evans, AirWatch by VMware : Les utilisateurs de solution de mobilité recherchent de rapidité et de simplicité
1er avril 2014, par Marc JacobL’environnement de travail bascule dans la mobilité. Les tablettes et les smartphones ont fait leur entrée dans l’univers professionnel et il est temps de le prendre en compte pour faire de la mobilité non pas une menace à la sécurité mais un vrai atout stratégique. AirWatch gère et sécurise la mobilité d’entreprise, des terminaux aux applications en passant par les documents. Selon Ian Evans, Vice President and Managing Director – EMEA, AirWatch by VMware, les utilisateurs de solution de mobilité (...)
-
5 factors data centers must contend with in the IoT era
3 May 2016, by Brian Lavallée is Director of Technology & Solutions Marketing for Ciena’s packet networking solutionWhether it’s 25 billion or 75 billion “things” connected to the Internet by 2020, there’s no question that the Internet of Things (IoT) will generate huge amounts of data, changing the way business is conducted and how we go about our day-to-day tasks. IoT promises to improve the way we live, work, and play, but could its progress be hindered by data centers being unable to cope with the data demands?
Below are five key factors data center providers must consider for the IoT era:
1.) Data (...) -
Florian Malecki, Dell Security : Comment devenir le « Department of YES » avec Dell Security !
8 juin 2016, par Marc JacobPour sa nouvelle participation à Infosecurity Europe Dell Security annonce d’une part une solution de Sandboxing appelé « Capture Advanced Threat Protection Service ». D’autre part, Dell Security a choisi ce salon pour lancer sa nouvelle campagne marketing « Department Of Yes » afin que les équipes sécurité puissent enfin dire « oui » aux demandes des métiers sans faire de compromis sur la sécurité. Florian Malecki, International Product MArketing director de Dell Security explique sa stratégie.
GS Mag : (...) -
Doug Rangi, OPSWAT: Protecting oil and gas industry from email threats
25 November 2015, by Doug Rangi, OPSWATAccording to a recent report from the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the energy sector, including oil and gas, is facing a significant rise in cyber attacks. There are a number of reasons that this industry is an ideal target for attack: Oil and gas pipelines are part of a country’s critical infrastructure, and they are an ideal target for those looking to cause disruptions in critical services for political or military motives; The industry is highly (...)
-
Fingerprints are king for payments in a post-COVID world
3 February 2021, by Vince Graziani, CEO, IDEX Biometrics ASAGiven the extent of changes to the way we work, live and conduct business over the past 12 months, it’s been difficult to keep track. Yet, with light at the end of the tunnel, it may well be our fingerprints that offer a sense of security as we head back into a transformed world.
Of course, we’re not at that tunnel’s end just yet. 2021 has begun with yet more lockdowns, offering a timely reminder that the restrictions associated with pandemic life weren’t just a 2020 phenomenon. In the retail (...) -
Sophos Comments: Military officer given task of “transforming” UK cyber security defence
17 March 2011, by SophosArmed forces minister Nick Harvey has announced the appointment of an unnamed, “very senior military officer” to take command of the Government’s Defence Cyber Operations Group, which was set up late last year.
Sophos’s public sector business development director, Graeme Stewart, has welcomed this announcement but has expressed concern about what the brief will be for the newly appointed role, and also, where the £650 million of funding, allocated to push research and defence forward, will be (...) -
CLUSIF : Un SOC adapté à chacun
8 décembre 2016, par Marc JacobPour sa dernière conférence de l’année 2016, le CLUSIF avait choisi de traité le thème du SOC, il est vrai que dans la perspective du RGPD ce sujet est d’autant plus d’actualité. Pour l’ensemble des intervenants le SOC est un outil de sécurité indispensable que chacun peut déployer à sa façon soit en propre, soit via un prestataire ou sous forme hybride en fonction de ses objectifs, de ses moyens techniques et humains.
Le SOC est un sujet en plein expansion a expliqué Thierry Chiofalo du CLUSIF en (...) -
How MDR is Used to Spot Third Party Risks, Insider Threats and More
12 October 2020, by SecurityHQIn a recent survey, SecurityHQ asked over 70,604 cyber security professionals the question, ‘What Keeps You Awake at Night? Third Parties, Insider Threats, or Nation State Actors?’. The results showed that, out of the three options, over 55.29% of those who took part said that Insider Threats concerned them the most. Followed by Third Party Risks, at 23.87%. And, finally, Nation State Actors at 20.85%.
What we aim to identify in this blog, is how Managed Detection and Response (MDR) can (...)