3 Lessons From the Incident Response Tabletops

Within the field of incident response, planning and testing are key elements of a good security posture. The importance of training and methods of developing tests both feature highly on security professionals’ priority lists. Here are a few lessons I’ve learned about incident response from having run tabletop exercises within…

Read More

Is Juice Jacking a Legitimate Threat or Nothing to Worry About?

Here’s another risk to add to the many issues that business travelers and their organizations must address: juice jacking — a type of cyberattack that involves malicious wall chargers or compromised mobile accessories. Public USB power charging stations are now ubiquitous in the spaces business travelers frequent, including airports, hotels…

Read More

3 Multicloud Security Considerations for the Modern Enterprise

More than 85 percent of companies already operate in multicloud environments and by 2021, 98 percent plan to use multiple hybrid clouds, according to the IBM Institute for Business Value (IBV). After cloud adoption, the application modernization trend follows, with an integral part of it being microservices architecture — decomposing…

Read More