Search
Close this search box.

Category: Security

As a result of recent cybersecurity breaches, a group of bipartisan lawmakers has been announced. Rep. Michael McCaul (R-Texas) and Sen. Jim Langevin (D-R.I.) are working on legislation that will require companies to notify the federal government in the event of a security breach. Futurum’s Shelly Kramer explores the need for the bill, especially in light of the SolarWinds and Microsoft Exchange Server hacks, the extent of the damage from which will remain unknown for some time. This proposed legislation makes sense — hopefully, this time around it will make it into law.
In this new episode of the Futurum Tech Webcast, Interview Series, the topic is all about security, and specifically focused on the role hardware plays in the enterprise security journey. Futurum’s Shelly Kramer is joined by Dell Technologies’ Rick Martinez and John Boyle for an insightful discussion centered on the four key insights we uncovered as a result of a recent research study, as well as a look at supply chain and how that’s been impacted in the last year, what executives can do to prepare their businesses for the current threat landscape, as well as looking to the future.
In this episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman tackle the thorny topic of cybersecurity and the fact that security breaches are frequent, inevitable, expensive, and risky. Security has been a foundational layer within IT since the beginning of time, but it’s clear that it’s not working. There are many factors that contribute to this, and there are some nascent technology solutions, like Confidential Computing, that we think are going to play an important role in the not too distant future. This is one of a series of conversations we’ll have on this topic, and we’ve got a soon-to-publish research paper on the topic of Confidential Computing that you won’t want to miss.
Microsoft has confirmed a significant security breach of its Exchange email servers and the theft of private emails from businesses, organizations, and government agencies around the world. Futurum’s Fred McClimans breaks down the timeline and what we know so far, and also discusses the behavior issue organizations face regarding on-premises systems.
Apple M1 vulnerability "Silver Sparrow" has opened discussions as to the M1 and Apple's security risks as it moves to homegrown chips.
In this episode of the Futurum Tech Webcast, host Shelly Kramer is joined by fellow analyst Fred McClimans for a conversation about some important cybersecurity news of the week that might’ve gotten lost as a result of horrible storms, power grid troubles, and lots of cold friends and colleagues. Their conversation focused on Clubhouse, the current darling of social apps Clubhouse and that fact that it’s powered by Agora, a Chinese-based company. Are their cybersecurity concerns there? Perhaps. We also explored the latest news from the US government on the SolarWinds hack, including startling information about its point of origin, and wrapped up with good news from Microsoft’s team around its investigation post SolarWinds hack. All in all, some great cybersecurity information and discussion that we think you’ll want to be a part of.
In this new episode of the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans break down the Russian government hack of U.S. government agencies and the role that the three As played in this, and every cybersecurity event.
New Episode: Futurum analysts Shelly Kramer, Olivier Blanchard, and Ron Westfall break down election week in the US, with a look at election security, the role technology played, the impact of data all the way around, and what happened with the market.
In this new episode of the Futurum Tech Webcast – Interview Series, Shelly Kramer sat down with Cisco’s Niraj Gopal, Director of Project Management for Webex Enterprise Security and Compliance. They explored trends in online collaboration and communications platforms, some key differentiators between platforms, how COVID-19 has changed the way we work (and live), and what’s going on in the enterprise leaders’ minds (and what they really need to know) as it relates to the security afforded by these platforms.