Category: Security

This week, Splunk hosted its observability day to celebrate the release of its observability suite and to share vision for its development.
In this Cybersecurity Shorts episode of the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans discuss the 3.2 billion password leak recently released in an online form. This 100GB data set includes 2.18 million unique emails and 26 million email domains, including some 1.5 million world government emails and 625,000-ish U.S. government passwords. Even more alarming is what the human behavior that’s involved here shows threat actors looking for targets
We believe that with AWS entering the Confidential Computing space, the bigger message here is that Big Tech is increasingly addressing data security in novel and important ways by addressing the entire data chain to ensure that organizations are able to pass on that security to their customers. We expect big things ahead in the Confidential Computing space and AWS, as always, is on the forefront.
In this quick vignette from the Futurum Tech Webcast Cybersecurity Shorts series, Futurum analysts Shelly Kramer and Fred McClimans discuss the China-linked hack of the Pulse Connect VPN and the targeting of a multitude of federal civilian agencies and financial institutions.
In this new series for the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans focus exclusively on cybersecurity, in a series we’re calling Cybersecurity Shorts. They’ll be tacking six cybersecurity topics in quick succession each week and if you’re in the cybersecurity business, this is one show you’ll want to be sure is on your radar screen.
The Sevis Systems eCallme! Platform continues to evolve with new call security and customer engagement features that are designed for enterprises. These are much-needed, especially in the enterprise space, as it relates to protecting against the spoofed call process and providing identity protection assurance for customers.
In this short video take, Futurum's Daniel Newman and Shelly Kramer discuss the differences between operational trust and technical trust. These two things form the basis of what Confidential Computing is really about.
In this article about the SAP cyberattack that is currently underway and actively exploiting known security vulnerabilities, Futurum’s Shelly Kramer provides details on the attack, those most at risk, and provides guidance for CISOs and their teams (and business leaders) to protect their organizations right now from these active cyberattacks on mission-critical SAP applications.
At Cisco Live 2021, Duo, a recent acquisition of Cisco, announced its new passwordless capabilities to meet increasing security demands.
In this new episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman go further into their multi-part series on Confidential Computing, and how vendors are looking to deploy trust-based computing models — and why that makes perfect sense. This conversation series is a precursor to our soon-to-be-published research brief on the topic of Confidential Computing, and if enterprise security is your thing, probably a don’t-miss conversation.
As a result of recent cybersecurity breaches, a group of bipartisan lawmakers has been announced. Rep. Michael McCaul (R-Texas) and Sen. Jim Langevin (D-R.I.) are working on legislation that will require companies to notify the federal government in the event of a security breach. Futurum’s Shelly Kramer explores the need for the bill, especially in light of the SolarWinds and Microsoft Exchange Server hacks, the extent of the damage from which will remain unknown for some time. This proposed legislation makes sense — hopefully, this time around it will make it into law.

Thank you, we received your request, a member of our team will be in contact with you.