Cloud security webinars, state of security and still alive long supply chain attack in the weekly cyber !

Cloud security webinars, state of security and still alive long supply chain attack in the weekly cyber !



How to Leverage Data-Centric Security Controls in AWS

A webinar is coming about Shift Gears: How to Leverage Data-Centric Security Controls in AWS

If you are forced to cloud, you'd better do it right because you take the responsibility of protecting the data you collect. Stay on top of your ... knowledge !


Judge Spares Former Uber CISO Jail Time Over 2016 Data Breach Charges

At least there is that

Judge Spares Former Uber CISO Jail Time Over 2016 Data Breach Charges

This case is a roller coaster !



The Business Risks and Costs of Source Code Leaks and Prevention Tips

Source code is the crown jewel of your softwares, unless open source for sure !

The Business Risks and Costs of Source Code Leaks and Prevention Tips

More and more these days, source code is lost in the leaky cloud, and that's a nightmware. Did you take the proper measures ? Did you reduce the risks ?


Amazon Inspector allows search of its vulnerability intelligence database

If you cloud, use the tools at your disposal at least ! Try to reduce the crazy state of leak !

Amazon Inspector allows search of its vulnerability intelligence database

Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure across your entire organization


No alt text provided for this image

Get ready for a serious price bump or contract cancelation following this

Court Rejects Merck Insurers' Attempt to Refuse Coverage for NotPetya Damages

And once insured, but one can trust things will change !


The Untold Story of the Boldest Supply-Chain Hack Ever

Must read ! The Untold Story of the Boldest Supply-Chain Hack Ever

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation. And even today, this is NOT cleared out.


No alt text provided for this image

XM Cyber share their Top 10 Favorite Cybersecurity Podcasts

I bet you know some of them, and obviously not an exhaustive list I guess.


A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening

Risk reduction, security control validation, and assessing how exploitable your vulnerabilities are; a lot of actions you can't ignore.

A cancer centre is the latest victim of cyber attacks. Why health data hacks keep?happening

The responsibilities of each organization is key, as each organization security is way more than just itself. Shared by Orenda Security.


Wishing you all a great week !

Gordon S. Kerman

IT Manager / CyberSecurity / Software Dev / IT Engineering Manager: Science, Engineering and Manufacturing

1 年

Thoroughly enjoyed this read Alexandre BLANC Cyber Security, I suspect that we will be at odds with the cloud for some time to come :} Not to mention the criminal element ...

Joshua D.

LF work for over 2 years now! Hire me!

1 年

Hey Alex, need to ask some questions for you on how you get gigs.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了