Secure in Transmission and Secure Behind the Network

In the past, the only discussions people had about email were focused on the never-ending inbox and the amount of time wasted filtering through it. The Snowden revelations changed all that. Suddenly, every mainstream media outlet was covering email and its lack of security. Companies reconsidered how they sent intellectual property outside the office, and the public began asking about safe methods for exchanging personal data with their service providers. But like most jolts, the effect of the Snowden revelations wore off. Companies forgot about the risk of email amidst the flurry of business, and the public became distracted by everyday life.

Spotlight

Network & Security Technologies

Network & Security Technologies (N&ST) is a nationwide leader in cyber security for electric utilities. The team of consultants from N&ST has worked on the hardest cyber security problems at the largest electric utilities in North America. N&ST specifically specializes in helping companies achieve compliance with the current NERC cyber security standards, NERC CIP-002 through NERC CIP-011, and NERC CIP-014. As a vendor-neutral consulting company, N&ST helps companies achieve sustainable compliance by developing the processes, documentation and records needed for compliance - not just by throwing technology at the problem.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More

Spotlight

Network & Security Technologies

Network & Security Technologies (N&ST) is a nationwide leader in cyber security for electric utilities. The team of consultants from N&ST has worked on the hardest cyber security problems at the largest electric utilities in North America. N&ST specifically specializes in helping companies achieve compliance with the current NERC cyber security standards, NERC CIP-002 through NERC CIP-011, and NERC CIP-014. As a vendor-neutral consulting company, N&ST helps companies achieve sustainable compliance by developing the processes, documentation and records needed for compliance - not just by throwing technology at the problem.

Events