Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Patrick Lastennet
Director of Business Development, Enterprisefeature_status*/ ?>
Interxion

Comments Dotted : 3
January 24, 2020

Cybersecurity Experts Weigh In On Jan. 28 Data Privacy Day

Enterprises can’t count on their providers’ compliance alone – they must ensure their own forms of protection as well.
In today’s sophisticated threat landscape, customers expect that the enterprises they’re doing business with are protecting their data and privacy, no matter where in the world they are located. These expectations are shifting how businesses must now operate, especially considering they also need to adhere to an ever-widening set of data privacy regulations, including GDPR. While meeting these compliance regulations is complex and challenging, they cannot be ignored. A key part of this will .....Read More
In today’s sophisticated threat landscape, customers expect that the enterprises they’re doing business with are protecting their data and privacy, no matter where in the world they are located. These expectations are shifting how businesses must now operate, especially considering they also need to adhere to an ever-widening set of data privacy regulations, including GDPR. While meeting these compliance regulations is complex and challenging, they cannot be ignored. A key part of this will be for businesses to plan their infrastructure, and data handling and storing processes accordingly. Most enterprises managing customer data are likely leveraging at least one form of cloud – which becomes increasingly complicated when different service providers have their own processes for remaining compliant. Enterprises can’t count on their providers’ compliance alone – they must ensure their own forms of protection as well. In order to still reap the benefits of cloud, enterprises seeking to uphold the highest standard of data privacy will increasingly turn to encryption to protect their critical information. As such, securing encryption keys becomes a necessary layer of added security. Key encryption management services secure encryption keys in a Hardware Security Module (HSM) that is kept separate but in close proximity to the cloud environment in which their applications reside, allowing for high performance, low latency integration with cloud apps without compromising on security or compliance. Since most enterprises don’t have the necessary resources to do this on their own, turning to a managed service within a colocated data center provides the perfect solution for key encryption management. Not only will this help enterprises adhere to strict data privacy regulations, but it will also help them win in the ever-scrutinizing eyes of consumers looking to hold businesses to a higher standard in the wake of high-profile data privacy scandals.  Read Less
Like(0)  (0)

Linkedin Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Enterprises can’t count on their providers’ compliance alone – they must ensure their own forms of protection as well. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Enterprises can’t count on their providers’ compliance alone – they must ensure their own forms of protection as well. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 12, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre.
Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre. This has made securing their environments somewhat less complex, as organizations could effectively manage all of their internal workloads in one place. But if you’ve read anything about IT management over the past decade, it’s clear that this traditional network architecture is evolving. It’s transitioning toward a decentralized model where enterprises can tap cloud providers, SaaS .....Read More
Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre. This has made securing their environments somewhat less complex, as organizations could effectively manage all of their internal workloads in one place. But if you’ve read anything about IT management over the past decade, it’s clear that this traditional network architecture is evolving. It’s transitioning toward a decentralized model where enterprises can tap cloud providers, SaaS platforms and proprietary data centres, which makes for a far more distributed architecture. And, as organisations think about their more decentralized architectures and the requirements for seamless connectivity across platforms and environments, rethinking their security strategy as part of that will be critical. To have a successful distributed architecture, enterprises need a security strategy that combines physical and network security with robust encryption key management to mitigate threats without inhibiting performance.  Read Less
Like(3)  (0)

Linkedin Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 08, 2019

Cyber Security Awareness Month Reminds Businesses To Stay Safe This October

Organizations need to consider matters of security with the utmost importance every day.
Although October is Cybersecurity Awareness month, organizations need to consider matters of security with the utmost importance every day, not just this month – particularly when it comes to cloud. Cloud security challenges can vary greatly depending on how far along organizations are on their digital transformation. On the one hand, more conservative and regulated enterprises find themselves inhibited along their digital transformation journeys, while on the other hand, more aggressive.....Read More
Although October is Cybersecurity Awareness month, organizations need to consider matters of security with the utmost importance every day, not just this month – particularly when it comes to cloud. Cloud security challenges can vary greatly depending on how far along organizations are on their digital transformation. On the one hand, more conservative and regulated enterprises find themselves inhibited along their digital transformation journeys, while on the other hand, more aggressive digital natives are left exposed to punitive data protection legislation and increasingly privacy conscious consumers. For any organization looking to protect against a data breach, encrypting data and adopting industry best practices for managing encryption keys is crucial. Leveraging colocated encryption key management services that secure encryption keys in a Hardware Security Module (HSM) outside of, but in close proximity to, the cloud environment in which their applications reside allow for high performance, low latency integration with cloud apps without compromising on security or compliance.  Read Less
Like(0)  (0)

Linkedin Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations need to consider matters of security with the utmost importance every day...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-awareness-month-reminds-businesses-to-stay-safe-this-october

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Lastennet, Director of Business Development, Enterprise, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations need to consider matters of security with the utmost importance every day...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-awareness-month-reminds-businesses-to-stay-safe-this-october

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel