Tag: cybersecurity

In this new series for the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans focus exclusively on cybersecurity, in a series we’re calling Cybersecurity Shorts. They’ll be tacking six cybersecurity topics in quick succession each week and if you’re in the cybersecurity business, this is one show you’ll want to be sure is on your radar screen.
In this article about the SAP cyberattack that is currently underway and actively exploiting known security vulnerabilities, Futurum’s Shelly Kramer provides details on the attack, those most at risk, and provides guidance for CISOs and their teams (and business leaders) to protect their organizations right now from these active cyberattacks on mission-critical SAP applications.
In this new episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman go further into their multi-part series on Confidential Computing, and how vendors are looking to deploy trust-based computing models — and why that makes perfect sense. This conversation series is a precursor to our soon-to-be-published research brief on the topic of Confidential Computing, and if enterprise security is your thing, probably a don’t-miss conversation.
As a result of recent cybersecurity breaches, a group of bipartisan lawmakers has been announced. Rep. Michael McCaul (R-Texas) and Sen. Jim Langevin (D-R.I.) are working on legislation that will require companies to notify the federal government in the event of a security breach. Futurum’s Shelly Kramer explores the need for the bill, especially in light of the SolarWinds and Microsoft Exchange Server hacks, the extent of the damage from which will remain unknown for some time. This proposed legislation makes sense — hopefully, this time around it will make it into law.
In this new episode of the Futurum Tech Webcast, Interview Series, the topic is all about security, and specifically focused on the role hardware plays in the enterprise security journey. Futurum’s Shelly Kramer is joined by Dell Technologies’ Rick Martinez and John Boyle for an insightful discussion centered on the four key insights we uncovered as a result of a recent research study, as well as a look at supply chain and how that’s been impacted in the last year, what executives can do to prepare their businesses for the current threat landscape, as well as looking to the future.
In this episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman tackle the thorny topic of cybersecurity and the fact that security breaches are frequent, inevitable, expensive, and risky. Security has been a foundational layer within IT since the beginning of time, but it’s clear that it’s not working. There are many factors that contribute to this, and there are some nascent technology solutions, like Confidential Computing, that we think are going to play an important role in the not too distant future. This is one of a series of conversations we’ll have on this topic, and we’ve got a soon-to-publish research paper on the topic of Confidential Computing that you won’t want to miss.
In this episode of the Futurum Tech Webcast, host Shelly Kramer is joined by fellow analyst Fred McClimans for a conversation about some important cybersecurity news of the week that might’ve gotten lost as a result of horrible storms, power grid troubles, and lots of cold friends and colleagues. Their conversation focused on Clubhouse, the current darling of social apps Clubhouse and that fact that it’s powered by Agora, a Chinese-based company. Are their cybersecurity concerns there? Perhaps. We also explored the latest news from the US government on the SolarWinds hack, including startling information about its point of origin, and wrapped up with good news from Microsoft’s team around its investigation post SolarWinds hack. All in all, some great cybersecurity information and discussion that we think you’ll want to be a part of.
In this new episode of the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans break down the Russian government hack of U.S. government agencies and the role that the three As played in this, and every cybersecurity event.

Thank you, we received your request, a member of our team will be in contact with you.