It’s that time of the year, October and Cyber Security Awareness month. But it’s also time for Halloween. Spend a few moments with us to learn some tips on how to avoid malicious 'tricks' that appear in your inbox.
Just thinking about a data breach will make any IT or security professional sweat. And, for good reason. We know that the cost of a data breach goes far beyond a dollar figure. The loss of data impacts brand, customers, partnerships, and more. And, when you throw in managing data in the cloud, working with security can become even more complicated.
Doug Madory, our Director of Internet Analysis at Oracle Internet Intelligence, presented at RIPE 79 in Rotterdam, Netherlands. The presentation centered on Doug’s original research on BGP AS path prepending and the unintended vulnerabilities created by the practice.
Bad actors want your organization’s wealth. Unfortunately, wealth today means not just the money in your bank accounts, but also your data. Data such as intellectual property, customer files, transaction records, and software source code are the kind of assets that define the wealth of modern businesses.
I would like to share the unique advantages of building a zero-trust environment and a trusted applications environment when you have control of the entire stack. Let’s discuss what are some of the unique advantages of using a building and managing an application stack on a tightly controlled platform.