Advertisement

cio1100

Virtual Event - 12.00pm - 13.00pm BST

Join 2020's Top 3 CIOs plus some of this year’s judging panel to gain tips on how to build a submission and share what you have achieved, see what it means to be a part of the CIO 100 from last year's winners and hear trends that will be focused on for 2021.

cio lenovo article image 1200x800 v2

Virtual Event - 12:00pm - 13.00pm BST

Join Aston Martin’s head of IT Steve O’Connor, for a discussion around VR and AR adoption, where he will reveal how the legendary car manufacturer leveraged these technologies to evolve customer experience, design and engineering.

Advertisement

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

7 best practices for enterprise attack surface management

Follow this advice to minimize vulnerabilities and give threat actors fewer opportunities to compromise your organization's network and devices.


cio dell boomi article image 1200x800 v2 1

Virtual Event - 12.00pm - 13.00pm BST

Having successfully kept their organisations functioning during lockdown, CIOs and technology leaders have been left to make sense of their new-look enterprise architecture and establish a more effective application and data foundation for the post-pandemic era.

hsm shredder

IT asset disposal is a security risk CISOs need to take seriously

Sensitive company and personal data often leaves organizations on disposed devices. An auditable chain of custody that shows data destruction is essential for any ITAD program.


Advertisement

Cybersecurity awareness  >  A man with a binary blindfold finds his way through question marks.

Report: Active Directory Certificate Services a big security blindspot on enterprise networks

Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.


healthcare data breach / medical patient privacy security violation

5 biggest healthcare security threats for 2021

Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, and phishing to be their top risks.


A hook is cast at laptop email with fishing lures amid abstract data.

4 steps to prevent spear phishing

Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.


CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Thousands of publicly accessible VMware vCenter Servers vulnerable to critical flaws

With proofs of concept public, attackers are likely exploiting this vulnerability weeks after patches were released.


ransomware breach hackers dark web

Unique TTPs link Hades ransomware to new threat group

New research exposes details of Gold Winter threat group that links it to the infamous Hades ransomware.