Remove 2022 Remove Architecture Remove Authentication Remove Blog
article thumbnail

IntelligentSIA: 11 Ways to Learn, Grow & Engage With SIA This Month

Security Industry Association

Here’s What Else You Need to Know This Month: Entries are now being accepted for the 2022 SIA New Products and Solutions (NPS) Awards! e-learning opportunity: a technical track exploring the essentials of video surveillance systems, as well as device hardening, video authentication and data protection.

article thumbnail

Managing the Perils of Data Exfiltration

Pure Storage

Managing the Perils of Data Exfiltration by Pure Storage Blog Data exfiltration used to be an exploit limited to spy thrillers, but lately, a day doesn’t go by without data exfiltration popping up in the news. To respond to ever-evolving threats, data resiliency must be baked into the architecture from the ground up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the Perils of Data Exfiltration

Pure Storage

Managing the Perils of Data Exfiltration by Pure Storage Blog Data exfiltration used to be an exploit limited to spy thrillers, but lately, a day doesn’t go by without data exfiltration popping up in the news. To respond to ever-evolving threats, data resiliency must be baked into the architecture from the ground up.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

ISC East 2022 is coming up Nov. In this blog, Knehr provides expert insights on this critical topic and gives a sneak peek of what to expect during this session. Most modern-day network architectures work a lot like airports. Access to every resource must be authenticated and approved. Join us Thursday, Nov.

article thumbnail

Cloud Data Security Challenges, Part 3: Getting Control

Pure Storage

According to Cybersecurity Insiders’ 2022 Cloud Security Report : . In part 2 of our three-part cloud data security blog series, we discussed the issue of complexity. As an example, you should always require security verification (authentication and authorization controls) for downloads to and from unsecured devices. .

article thumbnail

Two Outages in Two Weeks? Get DR for AWS

Zerto

At the end of November, I blogged about the need for disaster recovery in the cloud and also attended AWS re:Invent in Las Vegas, Nevada. I covered this topic in more detail in my last blog post , but the highlights bear repeating in light of these recent outages. How Safe is the Cloud? It’s Complicated .

Outage 97
article thumbnail

Don’t Be Intimidated by OSDP

Security Industry Association

ISC East 2022 is coming up Nov. In this blog, Diodato provides expert insights on this critical topic and gives a sneak peek of what to expect during this session. Once accomplished, the benefits realized from implementing OSDP as that replacement ensure futureproof system architectures and enhanced functionality.