You searched for legacy systems | SC Media

Your search for legacy systems returned 47 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Doug Olenick remove

Your search for legacy systems returned 47 results

Sort Results:

Relevant Recent
Executive Insight, Opinion, Security News

What does the SharePoint 2010 end of life mean for users?

SharePoint 2010 will reach end of life (EOL) on October 13, 2020. As Microsoft prepares to sunset the collaboration platform, users need to know what steps to take before extended support is no longer available. If your organization is still using SharePoint 2010, keep reading to learn everything you need to know before the shutdown.…
Executive Insight, Opinion, Security News

Securing multi-cloud environments: assurance through consistency

Meeting the security and compliance needs across different cloud service providers (CSP), and an organization’s own data center, remains a thorny challenge. Today, many enterprises are migrating business-critical workloads to the cloud, or have done so recently. Others are taking a ‘lift-and-shift’ approach for select applications, leveraging new integrations for legacy systems. This journey may…
Executive Insight, Security News

The Digital Unraveling: Vigilantes, Rogue Competitors, Big Break Ups, and Broken Trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed online with ever-decreasing time to fix…
Security News, Vulnerabilities

Microsoft’s May Patch Tuesday covers ZombieLoad, WER vulnerabilities

Microsoft put forth a long list of security updates to cover 79 vulnerabilities, 19 listed as critical, which included four connected to a Microarchitectural Data Sampling (aka ZombieLoad) vulnerability in Intel processors in its May Patch Tuesday release. While CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 grabbed the headlines yesterday, Microsoft also patched CVE-2019-0863 which has been spotted…
Executive Insight, Opinion

The digital unraveling: Vigilantes, rogue competitors, big break ups, and broken trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed online with ever-decreasing time to fix…
Network Security

Clarksons’ breach again shows need to eliminate passwords

The global shipping firm Clarksons reported that it has suffered a cybersecurity breach which it, and outside security firms, believe was caused when a lone user account was hacked, again bringing to the forefront the need to move past the legacy username and password for logging in to a critical system. With basic login credentials…
Executive Insight, Opinion

How insurance CISOs can address cloud migration security concerns

The cloud is hardly new for most industries, but insurance is still in its early days with respect to widespread adoption. While solid progress is being made—a recent report from Novarica shows that more than 70% of insurers now use cloud computing (more than triple the last few years)—most have implemented it only in segments…
Executive Insight, Opinion

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…
Next post in Executive Insight