Top Reads in June: 6/9/2023
You already know that every day at?InformationWeek?there will be original reporting from our team of journalists and unique commentary you won’t see anywhere else. But in case you missed them, here are some of our favorites from June:
1. Cloud Security Solutions
Story by? Lookout
Key Points:
2. Future of Banking with AI
Story by?Joao-Pierre Ruth
Key Points:
3. Protecting the Cloud
Story by? Lookout
Key Points:
4. IWK on AI Moving Forward
Story by Sara Peters
Key Points:
5. Digital Transformation Weaknesses
Story by? Lookout
Key Points:
6. Uber Data Breach Aftermath
Story by?Carrie Pallardy
Key Points:
领英推荐
Latest Layoff Announcements
Original Story by?Jessica C. Davis, Updated by?Brandon J. Taylor
Key Points:
REGISTER NOW:
"Identifying Blind Spots Through External Attack Surface Management" Webinar on 6/13 - Sponsored by?Bitsight
On Tuesday – June 13, beginning at 1pm ET – tune into our online webinar featuring?Olivia Bilodeau, Senior Product Marketing Manager and?Brian Mulligan?VP of Product, Security Performance at?Bitsight?- as our speakers. This live webinar will be moderated by our colleague?Terry Sweeney.?REGISTER now at the link above.
"Identifying Blind Spots Through External Attack Surface Management"
Did you know that 69% of organizations have experienced some type of cyber attack in which the attack itself started through the exploit of an unknown, unmanaged, or poorly managed internet-facing asset?
Understanding the scope of your organization’s external attack surface is essential. The key to protecting your digital footprint is to continuously manage it in order to identify risks and prioritize vulnerable areas. Make informed decisions to reduce exposure and empower the growth and success of your organization by gaining visibility into what an attacker sees.
In this webinar, you will learn how to:
"The Right Approach to Zero-Trust for IoT Devices" Webinar on 6/22 - Sponsored by?Palo Alto Networks
On Thursday – June 22, beginning at 1pm ET – tune into our online webinar featuring?Qiang Huang, Senior Director, IoT Product Management at?Palo Alto Networks?as our Keynote Speaker. This live webinar will be moderated by our colleague?Peter Krass.?REGISTER now at the link above.
"The Right Approach to Zero-Trust for IoT Devices"
The traditional enterprise network perimeter is dissipating with work from home, BYOD, corporate resources shifting to the cloud, and Internet of Things (IoT) trends. The modern enterprise network now has to take into account all types of devices accessing the network, from conventional IT devices to non-conventional internet-enabled devices including security cameras, HVAC, smart lighting, smart blinds, infusion pumps, printers, smart coffee machines, smart TVs, virtual assistants, ATMs, and point-of-sale terminals, to name a few, comprising what is popularly called the Internet of Things (IoT).?
These devices create serious security concerns for enterprises as the IoT devices are often shipped with vulnerabilities, are difficult to patch, lack security controls, and significantly widen the threat surface, making the network more susceptible to lateral exploits.
The increase in the number of IoT devices and a reported 3 billion attacks on IoT devices in 2021 necessitates organizations to reassess their risk management strategy and move towards adopting a Zero Trust approach to include securing IoT devices.
In this webinar you will learn:
Treasures from the Archives...
Guest Commentary
Key Points:
This is just a taste of what’s going on. If you want the whole scoop, then?register for one of our email newsletters,?but only if you’re going to read it.?We want to improve the sustainability of editorial operations, so we don’t want to send you newsletters that are just going to sit there unopened. If you're a subscriber already, please make sure Mimecast and other inbox bouncers know that we’re cool and they should let us through. And if you’re thinking about?subscribing,?then maybe start with the InformationWeek in Review; it only arrives on Fridays.