Search
Close this search box.

Category: Cybersecurity

In this new episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman go further into their multi-part series on Confidential Computing, and how vendors are looking to deploy trust-based computing models — and why that makes perfect sense. This conversation series is a precursor to our soon-to-be-published research brief on the topic of Confidential Computing, and if enterprise security is your thing, probably a don’t-miss conversation.
As a result of recent cybersecurity breaches, a group of bipartisan lawmakers has been announced. Rep. Michael McCaul (R-Texas) and Sen. Jim Langevin (D-R.I.) are working on legislation that will require companies to notify the federal government in the event of a security breach. Futurum’s Shelly Kramer explores the need for the bill, especially in light of the SolarWinds and Microsoft Exchange Server hacks, the extent of the damage from which will remain unknown for some time. This proposed legislation makes sense — hopefully, this time around it will make it into law.
In this new episode of the Futurum Tech Webcast, Interview Series, the topic is all about security, and specifically focused on the role hardware plays in the enterprise security journey. Futurum’s Shelly Kramer is joined by Dell Technologies’ Rick Martinez and John Boyle for an insightful discussion centered on the four key insights we uncovered as a result of a recent research study, as well as a look at supply chain and how that’s been impacted in the last year, what executives can do to prepare their businesses for the current threat landscape, as well as looking to the future.
In this episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman tackle the thorny topic of cybersecurity and the fact that security breaches are frequent, inevitable, expensive, and risky. Security has been a foundational layer within IT since the beginning of time, but it’s clear that it’s not working. There are many factors that contribute to this, and there are some nascent technology solutions, like Confidential Computing, that we think are going to play an important role in the not too distant future. This is one of a series of conversations we’ll have on this topic, and we’ve got a soon-to-publish research paper on the topic of Confidential Computing that you won’t want to miss.
In this episode of the Futurum Tech Webcast, host Shelly Kramer is joined by fellow analyst Fred McClimans for a conversation about some important cybersecurity news of the week that might’ve gotten lost as a result of horrible storms, power grid troubles, and lots of cold friends and colleagues. Their conversation focused on Clubhouse, the current darling of social apps Clubhouse and that fact that it’s powered by Agora, a Chinese-based company. Are their cybersecurity concerns there? Perhaps. We also explored the latest news from the US government on the SolarWinds hack, including startling information about its point of origin, and wrapped up with good news from Microsoft’s team around its investigation post SolarWinds hack. All in all, some great cybersecurity information and discussion that we think you’ll want to be a part of.
In this new episode of the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans break down the Russian government hack of U.S. government agencies and the role that the three As played in this, and every cybersecurity event.
In this episode of the Futurum Tech Webcast – Women in Tech Interview Series, Futurum co-founder Shelly Kramer discusses cybersecurity and the IoT today with Riscure’s Jasmina Omic. Their conversation explores the foundation upon which PSA Certified was built and the benefits being PSA Certified brings to anyone developing and bringing to market IoT connected devices.
The REvil ransomware cyber gang claims to have attacked Brown-Forman, the owner of Jack Daniel’s and other popular liquor brands. The sophisticated ransomware gang claims to be holding 1TB of Brown-Forman corporate data for ransom, including employee information, pledging to leak the data in batches if the company does not respond to its demands. Brown-Forman has released few details about the attack, and claims “There are no active negotiations.”
The massive Twitter hack this past week was a wake-up call for many of the vulnerabilities our collective reliance on social media channels presents. Here is a short overview of the specifics that have been uncovered as a result of investigation by the FBI, lawmakers, cybersecurity experts and Twitter itself, as well as what the impact of a hack of this nature means for CISOs and their security vendor partners.
As we head into the new decade, the promise of IoT for CSPs is exciting. CSPs can redefine themselves as a smarter pipe, but must strive for quality service for future ecosystems like IoT. This market insight overview takes a look at the challenges CSPs face, some successful partnerships, and factors to consider moving forward.
Zoombombing is but one of the security concerns that Zoom is dealing with right now, as a lawsuit is filed in California citing a violation of the CCPA and the NY Attorney General is asking some tough questions about the company’s security practices. Zoom shares have skyrocketed since the beginning of the year and I am thrilled by their success. The path forward, however, relies on security. If the company is going to retain a customer base, especially that oh-so-valuable paid customer base that is what really allows companies to deliver shareholder value, then a proactive security first mindset is going to have to be the mantra they embrace and lead with. We’ll all be watching, and hoping they get this right.