Category: Cybersecurity & Resilience

We believe that with AWS entering the Confidential Computing space, the bigger message here is that Big Tech is increasingly addressing data security in novel and important ways by addressing the entire data chain to ensure that organizations are able to pass on that security to their customers. We expect big things ahead in the Confidential Computing space and AWS, as always, is on the forefront.
In this quick vignette from the Futurum Tech Webcast Cybersecurity Shorts series, Futurum analysts Shelly Kramer and Fred McClimans discuss the China-linked hack of the Pulse Connect VPN and the targeting of a multitude of federal civilian agencies and financial institutions.
In this new series for the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans focus exclusively on cybersecurity, in a series we’re calling Cybersecurity Shorts. They’ll be tacking six cybersecurity topics in quick succession each week and if you’re in the cybersecurity business, this is one show you’ll want to be sure is on your radar screen.
The Sevis Systems eCallme! Platform continues to evolve with new call security and customer engagement features that are designed for enterprises. These are much-needed, especially in the enterprise space, as it relates to protecting against the spoofed call process and providing identity protection assurance for customers.
In this short video take, Futurum's Daniel Newman and Shelly Kramer discuss the differences between operational trust and technical trust. These two things form the basis of what Confidential Computing is really about.
In this article about the SAP cyberattack that is currently underway and actively exploiting known security vulnerabilities, Futurum’s Shelly Kramer provides details on the attack, those most at risk, and provides guidance for CISOs and their teams (and business leaders) to protect their organizations right now from these active cyberattacks on mission-critical SAP applications.
At Cisco Live 2021, Duo, a recent acquisition of Cisco, announced its new passwordless capabilities to meet increasing security demands.
In this new episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman go further into their multi-part series on Confidential Computing, and how vendors are looking to deploy trust-based computing models — and why that makes perfect sense. This conversation series is a precursor to our soon-to-be-published research brief on the topic of Confidential Computing, and if enterprise security is your thing, probably a don’t-miss conversation.
As a result of recent cybersecurity breaches, a group of bipartisan lawmakers has been announced. Rep. Michael McCaul (R-Texas) and Sen. Jim Langevin (D-R.I.) are working on legislation that will require companies to notify the federal government in the event of a security breach. Futurum’s Shelly Kramer explores the need for the bill, especially in light of the SolarWinds and Microsoft Exchange Server hacks, the extent of the damage from which will remain unknown for some time. This proposed legislation makes sense — hopefully, this time around it will make it into law.
In this new episode of the Futurum Tech Webcast, Interview Series, the topic is all about security, and specifically focused on the role hardware plays in the enterprise security journey. Futurum’s Shelly Kramer is joined by Dell Technologies’ Rick Martinez and John Boyle for an insightful discussion centered on the four key insights we uncovered as a result of a recent research study, as well as a look at supply chain and how that’s been impacted in the last year, what executives can do to prepare their businesses for the current threat landscape, as well as looking to the future.

Thank you, we received your request, a member of our team will be in contact with you.