You searched for legacy systems | SC Media

Your search for legacy systems returned 31 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Opinions remove

Your search for legacy systems returned 31 results

Sort Results:

Relevant Recent
Robert Brandewie, senior vice president, identity and security solutions, Telos Corporation

New challenges for access control

Security professionals can rest assured that solutions are emerging to both physical and access security problems that use sophisticated smart card-based credentials paired with a strong process of identity vetting and strict procedures for issuing the cards.
The News Team Blog

The latest Visa PCI compliance stats are in

Visa today announced that as of Sept. 30, 65 percent of level-one merchants - those processing more than six million transactions a year - are...
The News Team Blog

A tongue-lashing for DHS

It was like a child being scolded with no place to run.

A Congressional subcommittee had some harsh words this afternoon for Department of...
Executive Insight, Opinions

Six Cybersecurity Predictions for 2019

By Tim Steinkopf, president, Centrify Predictions are, well, predictably unreliable. But one certainty is that cyber breaches will continue to plague organizations in 2019. Here are six emerging trends that can help organizations stay strong in the coming year and build up their cyber defenses. #1: Zero Trust Goes from Buzzword to Reality As catastrophic data…
Executive Insight, Opinions

Automating for Endless zero-days

By Derek Manky, chief of security insights & global threat alliances, Fortinet The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6 percent were actually exploited in the wild. The challenge is that predicting which vulnerability…
Executive Insight, Opinions

Winning the Botnet Wars

By Anthony Giandomenico, Senior Security Strategist and Researcher, FortiGuard Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions…
Next post in Executive Insight