Jan 11, 2020 | Amazon, Applications, Asset Management, Attack Vectors, Big Tech, Business, Cloud, Compliance, Cyber Liability, Cybersecurity, Data Assets, Encryption, Fines and Penalties, Google, Governance, Incident Response, Microsoft, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Updates
Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about “the cloud,” and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years....
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...