article thumbnail

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Security Industry Association

One impactful group in this ongoing battle is the Common Vulnerabilities and Exposures Program (CVE). Spearheaded by the MITRE Corporation, CVE is a crucial framework for identifying and managing vulnerabilities across various systems. Risk mitigation: Identifying vulnerabilities is the first step towards mitigating risks.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Mass Gun Violence Trends Should Inform Physical Security Planning

Security Industry Association

In this article, we examine national gun violence data regarding shooter event frequency, locations and weapons used and review the insights. Still, many workers and visitors experience daily anxiety that comes with feeling exposed, vulnerable or targeted. These insights can be used to inform your physical security planning.

article thumbnail

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance

Pure Storage

In this article, we’ll discuss what the new framework entails, who it affects, and how telcos can prepare their IT infrastructures to comply with the framework’s primary piece of legislation: the Telco (Services) Act (TSA) , which was passed into law in October 2022.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. It has been republished with permission from the author. But how do you achieve it?

Backup 96
article thumbnail

Deadly North Carolina Construction Blaze Could Spark Update to State Fire Code to Include More from NFPA 241

National Fire Protection Association

I’m really proud of the latest edition of the standard,” Bruce Campbell, a fire protection engineer and vice president at Jensen Hughes, who serves as the chair of the NFPA 241 technical committee, told NFPA Journal for a 2021 article that explored the changes to the latest edition of NFPA 241.

article thumbnail

A beginner’s guide to implementing zero-trust architecture

Online Computers

This article offers a layman’s overview of zero-trust architecture so you can better understand and appreciate how important it is to your business’s cybersecurity measures. According to him, trust is a security vulnerability and verification is a security necessity. What is zero-trust architecture?