//
archives

IT & TECHNOLOGY

This category contains 1385 posts

Encouraging Women in Tech is About a Better Future for All of Us


Why is ISACA’s SheLeadsTech program needed? Why does the 2030 Agenda for Sustainable Development consider the technology gender gap to be an important topic to address, and who must be involved in the solutions? Where are we now? Thematic focus and indicators are useful to understand the current situation. Factors such as access to education and training, Internet usage … Continue reading

Launching of Application Containers and Microservices


The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure use of application containers and microservices. CSA is currently looking for volunteers … Continue reading

In the Age of Cybersecurity, Are Data Centers Ignoring Physical Security?


Maintaining a data center is a huge responsibility. While you certainly have systems in place for dealing with cyberthreats, are you giving enough attention to physical security? This is still a very important aspect of the security equation. Five Tips for Keeping Data Centers Secure The objective of physical data center security is pretty straightforward: keep out unauthorized … Continue reading

A More Effective Cloud Security Approach: NGFW for Inline CASB


Cloud applications have changed the way organizations do business, introducing new security risks in the process. These applications are easy to set up and use for collaboration, and as a result, the volume and sensitivity of data being transferred, stored and shared in these cloud environments continues to increase. Simultaneously, users are constantly moving to … Continue reading

Four Important Best Practices for Assessing Cloud Vendors


When it comes to evaluating new vendors, it can be challenging to know how best to communicate the requirements of your vendor assessment process and ultimately select the right partner to help your business move forward — while at the same time avoiding the risk of a third-party security incident. After all, 63 percent of data breaches are … Continue reading

Cloud Security Alliance Issues New Code of Conduct for GDPR Compliance


Edinburgh, Scotland – November 21, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the CSA Code of Conduct for GDPR Compliance, which provides cloud service providers (CSPs), cloud customers, and potential customers with much-needed guidance in order … Continue reading

Cloud Security Alliance Releases New Cloud Security for Startups Report


SEATTLE, WA – November 20, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released a new report titled Cloud Security for Startups. The new white paper, developed by the CSA’s Israel chapter, aims to help Software-as-a-Service Startups (SaaS-SUs) … Continue reading

Need of the Hour: An Effective Cyber Security Leader


Cyber risks have taken center stage in the corporate world. It is estimated that more than 80 percent of organizations have now included cyber risk as one of the top five risks in their risk register. Cyber security has become a key concern for boards and executive leadership. Recent surveys and research suggest that although … Continue reading

2018 Predictions & Recommendations: The Cloud Will Accelerate Channel Partner Migration to Next-Generation Security Innovators


This post is part of an ongoing blog series examining predictions and recommendations for cybersecurity in 2018. It wasn’t long ago that success in the security channel was based on a partner’s ability to integrate point products. The more point products you offered, the better because the complexity – and, therefore, your margin – was … Continue reading

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up


This post is part of an ongoing blog series examining predictions and recommendations for cybersecurity in 2018. Automated Threat Response and Relevance to IT and OT Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For … Continue reading

Web Stats

  • 126,468 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,652 other followers

Twitter Updates

Archives

January 2018
M T W T F S S
« Dec    
1234567
891011121314
15161718192021
22232425262728
293031