It looks like this is a web page, not a feed. I looked for a feed associated with this page, but couldn't find one. Please enter the address of your feed to validate.

Source: http://feeds.feedburner.com/scmagazinenews

  1. <!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@SCMagazine"/><meta property="og:site_name" content="SC Media"/><title>Cybersecurity News, Awards, Webinars, eSummits, Research | SC Media</title><meta name="robots" content="index,follow"/><meta name="description" content="The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market."/><meta property="og:title" content="Cybersecurity News, Awards, Webinars, eSummits, Research"/><meta property="og:description" content="The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market."/><meta property="og:url" content="https://www.scmagazine.com"/><meta property="og:type" content="collection"/><meta property="og:image" content="https://www.scmagazine.com/images/fallback-image.png"/><meta property="og:locale" content="en_US"/><link rel="canonical" href="https://www.scmagazine.com"/><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":0,"item":{"@id":"https://www.scmagazine.com","name":"SC Media"}}]}</script><script type="application/ld+json">{"@type":"WebSite","url":"https://www.scmagazine.com","potentialAction":[{"@type":"SearchAction","query-input":"required name=query","target":{"@type":"EntryPoint","urlTemplate":"https://www.scmagazine.com/search?q={query}"}}],"@context":"https://www.schema.org"}</script><link rel="preload" as="image" imageSrcSet="https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1920w" imageSizes="(max-width: 768px) 100vw,(max-width: 992px) 67vw,934px" fetchpriority="high"/><link rel="preload" as="image" imageSrcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1920w" imageSizes="(max-width: 768px) 100vw,(max-width: 992px) 34vw,467px" fetchpriority="high"/><link rel="preload" as="image" imageSrcSet="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fplay.d8db0607.png&amp;w=256&amp;q=75 1x, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fplay.d8db0607.png&amp;w=384&amp;q=75 2x" fetchpriority="high"/><link rel="preload" as="image" imageSrcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1920w" imageSizes="(max-width: 768px) 100vw,(max-width: 992px) 34vw,467px" fetchpriority="high"/><meta name="next-head-count" content="21"/><link rel="manifest" href="/manifest.json"/><meta name="theme-color" content="#ee1c25"/><link rel="shortcut icon" href="/favicon.ico" type="image/x-icon"/><link rel="apple-touch-icon" sizes="57x57" href="/images/logo/icons/apple-touch-icon-57x57.png"/><link rel="apple-touch-icon" sizes="72x72" href="/images/logo/icons/apple-touch-icon-72x72.png"/><link rel="apple-touch-icon" sizes="76x76" href="/images/logo/icons/apple-touch-icon-76x76.png"/><link rel="apple-touch-icon" sizes="114x114" href="/images/logo/icons/apple-touch-icon-114x114.png"/><link rel="apple-touch-icon" sizes="120x120" href="/images/logo/icons/apple-touch-icon-120x120.png"/><link rel="apple-touch-icon" sizes="144x144" href="/images/logo/icons/apple-touch-icon-144x144.png"/><link rel="apple-touch-icon" sizes="152x152" href="/images/logo/icons/apple-touch-icon-152x152.png"/><link rel="apple-touch-icon" sizes="180x180" href="/images/logo/icons/apple-touch-icon-180x180.png"/><link rel="apple-touch-icon" href="/images/logo/icons/apple-touch-icon.png"/><link rel="preconnect" href="//lytics.cyberriskalliance.com"/><link rel="preconnect" href="//securepubads.g.doubleclick.net"/><link rel="preconnect" href="https://api.cyberriskalliance.com"/><link rel="preconnect" href="https://image-optimizer.cyberriskalliance.com"/><link rel="dns-prefetch" href="//ml314.com"/><link rel="dns-prefetch" href="//snap.licdn.com"/><link rel="preload" href="/_next/static/media/61ff65d0201baa35-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/9919cdaa7472f3f1-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/ee65d20c5e82dfb1-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/3a04115668d8070d-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/3a18fc8da1cdcd01-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/699512af39861afa-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/7d8c9b0ca4a64a5a-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/934c4b7cb736f2a3-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/627622453ef56b0d-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/0e4fe491bf84089c-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/css/e78f48706b7f6dc2.css" as="style"/><link rel="stylesheet" href="/_next/static/css/e78f48706b7f6dc2.css" data-n-g=""/><link rel="preload" href="/_next/static/css/d703647e42cb9e66.css" as="style"/><link rel="stylesheet" href="/_next/static/css/d703647e42cb9e66.css" data-n-p=""/><link rel="preload" href="/_next/static/css/72a5de0fc14b2090.css" as="style"/><link rel="stylesheet" href="/_next/static/css/72a5de0fc14b2090.css" data-n-p=""/><link rel="preload" href="/_next/static/css/1c396ff27a81c79f.css" as="style"/><link rel="stylesheet" href="/_next/static/css/1c396ff27a81c79f.css"/><link rel="preload" href="/_next/static/css/caeaa11e0e78aed2.css" as="style"/><link rel="stylesheet" href="/_next/static/css/caeaa11e0e78aed2.css"/><link rel="preload" href="/_next/static/css/bc90709fce58dfab.css" as="style"/><link rel="stylesheet" href="/_next/static/css/bc90709fce58dfab.css"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script defer="" src="/_next/static/chunks/7018-350fb145fca5408b.js"></script><script defer="" src="/_next/static/chunks/1331.14b8c9cc5e013588.js"></script><script defer="" src="/_next/static/chunks/4746.6afdf5f9abc2e8dd.js"></script><script defer="" src="/_next/static/chunks/2297.b04e701e93356b2e.js"></script><script defer="" src="/_next/static/chunks/8812.f87a5b52d2675243.js"></script><script src="/_next/static/chunks/webpack-eb6f902ecf83518b.js" defer=""></script><script src="/_next/static/chunks/framework-2c15c603e130d21e.js" defer=""></script><script src="/_next/static/chunks/main-47f9c8f6b1a88945.js" defer=""></script><script src="/_next/static/chunks/pages/_app-5b705ca193f15c13.js" defer=""></script><script src="/_next/static/chunks/5351-f89038d388098723.js" defer=""></script><script src="/_next/static/chunks/6577-c09f3b7efb8d2ecd.js" defer=""></script><script src="/_next/static/chunks/2987-641bc65f28d14d44.js" defer=""></script><script src="/_next/static/chunks/7155-223aab044ae846f9.js" defer=""></script><script src="/_next/static/chunks/1552-b588e19d74d33299.js" defer=""></script><script src="/_next/static/chunks/5594-6dcacceda02d8709.js" defer=""></script><script src="/_next/static/chunks/3657-b71f1a9d524b247b.js" defer=""></script><script src="/_next/static/chunks/6913-0fc79a1d0332431d.js" defer=""></script><script src="/_next/static/chunks/1910-7d8e55632e580e02.js" defer=""></script><script src="/_next/static/chunks/2402-9c31f6eb5895c3ce.js" defer=""></script><script src="/_next/static/chunks/9901-4584e16d08f3defd.js" defer=""></script><script src="/_next/static/chunks/6299-76dabf0b8dde6c6b.js" defer=""></script><script src="/_next/static/chunks/6541-0ab10169346b93a5.js" defer=""></script><script src="/_next/static/chunks/7567-e03ed0f29f478f8e.js" defer=""></script><script src="/_next/static/chunks/pages/index-e8dfa713dc94a09b.js" defer=""></script><script src="/_next/static/mk0iT6z4ErbL2Bo9AFMKb/_buildManifest.js" defer=""></script><script src="/_next/static/mk0iT6z4ErbL2Bo9AFMKb/_ssgManifest.js" defer=""></script></head><body class="__variable_e4387f __variable_ee47b6"><div id="__next"><div class="__variable_e4387f __variable_ee47b6"><header class="HeaderWrapper_wrapper__tFRA6 header-wrapper font-heading-semibold fixed-top"><nav role="banner" class="HeaderWrapper_menuHeader__AikIr vw-100 mw-100 align-self-center px-0 px-xl-2 py-2 navbar navbar-expand-xl navbar-light"><div class="HeaderWrapper_navBarWrapper__hGsMc container-xxl"><button aria-controls="collapsable" type="button" aria-label="Toggle navigation" class="navbar-toggler collapsed"><span class="navbar-toggler-icon"></span></button><div class="Branding_navbarBrand__CDT91 Branding_centered__56XIV me-0 order-first"><a title="SC Media" href="/" class="d-block w-fit me-0 navbar-brand"><svg xmlns="http://www.w3.org/2000/svg" id="HeaderLogo_svg__SC" viewBox="12.28 17.02 422.27 164.72"><defs><style>.HeaderLogo_svg__cls-3{fill:gray}</style></defs><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path><path d="M259.02 68.06v62.16h-10.21V85.91l-18.92 31.26h-1.24l-18.92-31.35v44.4h-10.21V68.06h11.01l18.74 31.08 18.83-31.08h10.92ZM274.6 112.1c1.42 6.75 6.84 10.48 14.21 10.48 5.06 0 8.88-1.87 11.46-5.51l7.9 4.62c-4.35 6.48-10.83 9.68-19.45 9.68-7.19 0-13.05-2.22-17.5-6.57-4.44-4.44-6.66-10.04-6.66-16.79s2.22-12.17 6.57-16.61c4.35-4.53 10.04-6.75 16.87-6.75 6.48 0 11.81 2.31 15.99 6.84 4.17 4.53 6.31 10.12 6.31 16.61 0 .98-.09 2.31-.36 4H274.6Zm26.02-7.81c-1.33-7.19-6.39-10.92-12.7-10.92-7.1 0-12.08 4.17-13.41 10.92h26.11ZM351.86 68.06h9.59v62.16h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46V68.05Zm-14.03 54.17c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4ZM371.84 77.38c-2.4-2.49-2.4-6.22 0-8.61a6 6 0 0 1 8.7 0c2.4 2.4 2.4 6.13-.09 8.61-2.4 2.4-6.13 2.4-8.61 0Zm-.44 52.84v-44.4h9.59v44.4h-9.59ZM424.95 85.82h9.59v44.4h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46v-6.31Zm-14.03 36.41c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4Z"></path><path d="m214.78 167.39-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM227.85 164.9c-1.88-1.91-2.84-4.26-2.84-7.07s.96-5.16 2.84-7.05c1.89-1.91 4.29-2.87 7.16-2.87 3.47 0 6.58 1.75 8.22 4.56l-2.73 1.59c-1.01-1.89-3.08-3.09-5.49-3.09-2.05 0-3.69.66-4.97 1.94-1.26 1.28-1.89 2.92-1.89 4.92s.63 3.63 1.89 4.91c1.28 1.28 2.92 1.94 4.97 1.94 2.4 0 4.51-1.2 5.49-3.09l2.73 1.56c-.79 1.39-1.94 2.51-3.41 3.36-1.45.82-3.06 1.23-4.81 1.23-2.87 0-5.27-.96-7.16-2.84ZM256.18 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM273.94 167.39l-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM327.44 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM334.17 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM351.87 159.27c2.1.46 4.83 1.34 4.78 4.26 0 1.31-.52 2.35-1.53 3.09-1.01.74-2.27 1.12-3.8 1.12-2.7 0-4.7-1.2-5.57-3.2l2.54-1.47c.46 1.31 1.47 1.97 3.03 1.97s2.32-.52 2.32-1.53c0-.87-1.15-1.39-2.59-1.75-2.05-.52-4.81-1.34-4.75-4.2 0-1.26.46-2.27 1.42-3.03.96-.76 2.16-1.15 3.58-1.15 2.27 0 4.1 1.07 5.05 2.84l-2.49 1.39c-.46-1.04-1.34-1.56-2.57-1.56-1.12 0-1.99.49-1.99 1.45 0 .9 1.15 1.37 2.57 1.77ZM359.69 165.67c-1.39-1.39-2.1-3.08-2.1-5.11s.71-3.72 2.1-5.11c1.39-1.39 3.11-2.07 5.11-2.07s3.71.68 5.11 2.07c1.39 1.39 2.1 3.09 2.1 5.11s-.71 3.71-2.1 5.11c-1.39 1.39-3.09 2.08-5.11 2.08s-3.71-.68-5.11-2.08Zm5.11-.79c1.2 0 2.21-.41 3.03-1.23.82-.82 1.23-1.86 1.23-3.08s-.41-2.27-1.23-3.09c-.82-.82-1.83-1.23-3.03-1.23s-2.21.41-3.03 1.23c-.82.82-1.23 1.86-1.23 3.09s.41 2.27 1.23 3.08c.82.82 1.83 1.23 3.03 1.23ZM383.35 153.73h2.95v13.66h-2.95v-1.75c-.9 1.39-2.29 2.1-4.23 2.1-3.14 0-5.24-2.13-5.24-5.63v-8.39h2.95v8.09c0 2.05 1.17 3.17 3.06 3.17 2.07 0 3.47-1.28 3.47-3.93v-7.32ZM392.15 156.03c.74-1.69 2.16-2.54 4.2-2.54v3.2c-1.12-.08-2.1.19-2.95.82-.85.6-1.26 1.61-1.26 3v6.88h-2.95v-13.66h2.95v2.29ZM398.65 165.67c-1.37-1.39-2.05-3.08-2.05-5.11s.68-3.74 2.05-5.11 3.11-2.07 5.16-2.07c2.65 0 5 1.37 6.09 3.52l-2.54 1.47c-.63-1.31-1.94-2.1-3.58-2.1-1.2 0-2.21.41-3.03 1.23-.79.82-1.2 1.83-1.2 3.06s.41 2.24 1.2 3.06c.82.82 1.83 1.23 3.03 1.23 1.61 0 2.98-.82 3.63-2.1l2.54 1.45c-1.17 2.19-3.5 3.55-6.14 3.55-2.05 0-3.77-.68-5.16-2.08ZM413.65 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM294.75 173.45c-.08 0-.16-.03-.23-.07l-10.86-7.75a.46.46 0 0 1-.16-.23l-3.61-16.17c-.04-.17.04-.35.2-.43l14.48-7.88c.12-.06.26-.06.38 0l14.46 7.88c.15.08.23.26.2.43L306 165.42c-.02.1-.08.18-.16.24l-10.85 7.73a.39.39 0 0 1-.23.07Zm.55-7.66v6.02l8.45-6.02h-8.45Zm-9.54 0 8.43 6.01v-6.01h-8.43Zm9.84-1.11h9.01l-4.51-10.01-4.51 10.01Zm-10.72 0h9.01l-4.51-10.01-4.51 10.01Zm5.35-10.8 4.51 10.02 4.51-10.02h-9.02Zm10.63-.21 4.43 9.84 2.97-13.28-7.39 3.45Zm-19.62-3.45 2.97 13.28 4.43-9.83-7.39-3.45Zm9 2.57h9.02l-4.51-10.01-4.51 10.01Zm-8.57-3.59 7.42 3.47 4.48-9.96-11.91 6.49Zm14.26-6.49 4.48 9.95 7.43-3.46-11.91-6.49Z" class="HeaderLogo_svg__cls-3"></path></svg></a></div><div class="Header_ssoColumn__IISom order-4 order-md-last mt-1 navbar-nav"><span class="SsoHeader_greetingsWrapper__VkCCc" style="min-width:15%;min-height:1px"></span></div><div class="justify-content-center order-last order-xl-0 navbar-collapse collapse" id="collapsable"><div class="nav-fill d-flex navbar-nav"><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">CISO Stories</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Topics</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Events</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Podcasts</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Research</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Recognition</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">Leadership</a></div><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/#" data-rr-ui-event-key="/#" class="nav-link nav-link">About</a></div></div></div><div class="Header_search__lGf0E"><button class="InlineSearch_toggle__k4nSw border-0 px-2 mx-1 search-toggle" aria-labelledby="header-search-bar-toggle"><svg xmlns="http://www.w3.org/2000/svg" fill="none" stroke="currentColor" aria-hidden="true" viewBox="-2 -2 20 20" width="20" height="20" class="InlineSearch_icon__Nu2iI"><circle cx="6.5" cy="6.5" r="5.75" stroke-width="1.5"></circle><path stroke-linecap="round" stroke-width="1.5" d="M11.061 11 15 14.939"></path></svg><span id="header-search-bar-toggle" hidden="">Open<!-- --> Search Bar</span></button></div></div></nav></header><div class="landing-page homepage_wrapper__JS8cz homepage"><div class="slot_wrapper__JFKwH p-0 position-fixed left-0 skin dfp-slot ad mb-3 pb-0 d-flex flex-column align-items-center"><div><div class="mx-auto" id=":Rakm:"></div></div></div><meta name="googlebot" content="index,follow"/><div class="visually-hidden" itemscope="" itemType="https://schema.org/CollectionPage" itemID="https://www.scmagazine.com#collectionPage"><h1>Cybersecurity News, Awards, Webinars, eSummits, Research</h1><meta itemProp="name" content="Cybersecurity News, Awards, Webinars, eSummits, Research"/><meta itemProp="about" content="The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market."/></div><div class="homepage_landingContent__VCzdO landing-content"><main><div><div class="layout layout0 hero hero dynamicLayout_fg__JY7ts position-relative container-xxl"><div class="row"><div class="Regions_contentColumn__zwode content-column col-md-12 col-12"><div class="Placeholder_leaderboard-pl__XT4_e slot_wrapper__JFKwH Placeholder_small__NgFzP dfp-slot ad mb-3 pb-0 d-flex flex-column align-items-center"><div><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R732km:"></div></div></div></div></div></div><div class="layout layout1 hero hero-8-4 dynamicLayout_fg__JY7ts position-relative container-xxl"><div class="row"><div class="Regions_contentColumn__zwode content-column col-md-8"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0"><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="FeaturedPost_featuredFeedPost__t_m1P teaser teaser-list-item typography-v2"><div><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link d-block" href="/perspective/will-the-change-healthcare-case-finally-make-providers-do-a-business-impact-analysis"><div class="Overlay_overlayWrap__fxtmP FeaturedPost_imageWrapper__M9szB"><img alt="UnitedHealthcare&#x27;s Change Healthcare" fetchpriority="high" width="1021" height="681" decoding="async" data-nimg="1" class="MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1021 681&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 100vw,(max-width: 992px) 67vw,934px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg"/></div></a><div class="FeaturedPost_textWrapper___X7Gj tmt-1"><div class="text-xsmall"><p>In the wake of UnitedHealth’s admission that the Change Healthcare attack will cost it $1.6 billion, today’s columnist, Toby Gouker of First Health Advisory, explains why providers have to conduct a business impact analysis and depend less on cyber insurance. (Adobe Stock)</p>
  2. </div><a href="/perspective/will-the-change-healthcare-case-finally-make-providers-do-a-business-impact-analysis"><h1 itemProp="headline">Will the Change Healthcare case finally make providers do a business impact analysis?</h1></a><p class="text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/toby-gouker"><span itemProp="name"><span itemProp="givenName">Toby <!-- --> </span><span itemProp="familyName">Gouker </span></span></a></span><time class="non-interactive" dateTime="2024-04-22T07:00:00.000-04:00">April 22, 2024</time></p><div itemProp="abstract" class="font-body-large"><div><p>The industry has talked about BIAs for years – and most providers still lean on cyber insurance in the wake of attack. That has to change. </p>
  3. </div></div></div></div></article></div></div><div class="Regions_contentColumn__zwode content-column col-md-4"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 featured-post"><div class="FeaturedPost_featuredPost__DQmIs featured-post-ppworkssegment"><a class="featured-post-image-link d-block mb-2" href="/podcast-segment/12785-how-genai-can-improve-secops-ely-kahn-esw-359"><div class="Overlay_overlayWrap__fxtmP"><img alt="An Enterprise Security Weekly Roundtable on trusting autonomous security products to protect and serve - no humans need apply." fetchpriority="high" width="1128" height="630" decoding="async" data-nimg="1" class="FeaturedPost_image__okxd6 featured-image MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1128 630&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 100vw,(max-width: 992px) 34vw,467px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg"/><img alt="" fetchpriority="high" width="175" height="175" decoding="async" data-nimg="1" class="Overlay_playBtn__7U_r8 MediaItem_img__QQ6NG" style="color:transparent" srcSet="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fplay.d8db0607.png&amp;w=256&amp;q=75 1x, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fplay.d8db0607.png&amp;w=384&amp;q=75 2x" src="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fplay.d8db0607.png&amp;w=384&amp;q=75"/></div></a><div class="FeaturedPost_tag__nMQ8h tag font-body text-medium text-uppercase fw-bold mb-2"><a href="/topic/aiml">AI/ML</a></div><a class="featured-post-title-link" href="/podcast-segment/12785-how-genai-can-improve-secops-ely-kahn-esw-359"><h6 class="featured-post-title text-xlarge">An Enterprise Security Weekly Roundtable on trusting autonomous security products to protect and serve - no humans need apply.   </h6></a></div></div><div class="Placeholder_box-pl__ptGbn slot_wrapper__JFKwH my-auto Placeholder_medium__jvpai dfp-slot ad mb-3 pb-0 d-flex flex-column align-items-center"><div><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":Rl52km:"></div></div></div></div></div></div><div class="layout layout2 hero hero-8-4 dynamicLayout_fg__JY7ts position-relative container-xxl"><div class="row"><div class="Regions_contentColumn__zwode content-column col-md-8"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 Carousel_wrapper___MTpb horizontal-list-carousel typography-v2 mt-1"><h4 class="HorizontalList_blockHeader__EDUVk horizontal-list-with-image-block-header tmb-2 layout-title-large"><span itemProp="name">RESOURCES</span></h4><section itemscope="" itemType="https://schema.org/Collection"><meta itemProp="name" content="RESOURCES"/><div class="react-multi-carousel-list  py-0" dir="ltr"><ul class="react-multi-carousel-track " style="transition:none;overflow:unset;transform:translate3d(0px,0,0)"></ul></div></section></div><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 Carousel_wrapper___MTpb horizontal-list-carousel typography-v2 mt-1"><h4 class="HorizontalList_blockHeader__EDUVk horizontal-list-with-image-block-header tmb-2 layout-title-large"><span itemProp="name">PODCASTS</span></h4><section itemscope="" itemType="https://schema.org/Collection"><meta itemProp="name" content="PODCASTS"/><div class="react-multi-carousel-list  py-0" dir="ltr"><ul class="react-multi-carousel-track " style="transition:none;overflow:unset;transform:translate3d(0px,0,0)"></ul></div></section></div></div><div class="Regions_contentColumn__zwode content-column col-md-4"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 featured-post"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text h4 BlockWrapper_blockHeader__7q7cS">FEATURED</h3><div class="FeaturedPost_featuredPost__DQmIs featured-post-editorial"><a class="featured-post-image-link d-block mb-2" href="/news/call-for-2024-sc-awards-nominations"><div class="Overlay_overlayWrap__fxtmP"><img alt="Call for 2024 SC Awards nominations" fetchpriority="high" width="1200" height="700" decoding="async" data-nimg="1" class="FeaturedPost_image__okxd6 featured-image MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1200 700&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 100vw,(max-width: 992px) 34vw,467px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg"/></div></a><a class="featured-post-title-link" href="/news/call-for-2024-sc-awards-nominations"><h6 class="featured-post-title text-xlarge">Call for 2024 SC Awards nominations</h6></a></div></div><div class="DailyScanMarketoForm_wrapper__rsZEF daily-scan-form"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0"><h3 class="fs-4 underlined-text mb-3 border-0 text-uppercase">Get daily email updates</h3><div class="fs-6 mb-3">SC Media&#x27;s daily must-read of the most current and pressing daily news</div><form class="w-100"><div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""/></div><div class="fs-9 my-4"><p>By clicking the Subscribe button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions">Terms and Conditions</a><span> and </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a>.</p></div><div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div></form></div></div></div></div></div><div class="layout layout3 content content-2-7-3 dynamicLayout_fg__JY7ts position-relative container-xxl"><div class="row"><div class="Regions_contentColumn__zwode content-column col-md-2"><div itemscope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">Perspectives</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Five ways security leaders can demonstrate the business value of cybersecurity"/><div class="d-flex"><div><a itemProp="url" href="/perspective/five-ways-security-leaders-can-demonstrate-the-business-value-of-cybersecurity"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Five ways security leaders can demonstrate the business value of cybersecurity</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/steve-durbin"><span itemProp="name"><span itemProp="givenName">Steve <!-- --> </span><span itemProp="familyName">Durbin</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T07:00:00.000-04:00">April 26, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="How an adaptive approach can stop AI-based DDoS attacks"/><div class="d-flex"><div><a itemProp="url" href="/perspective/how-an-adaptive-approach-can-stop-ai-based-ddos-attacks"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">How an adaptive approach can stop AI-based DDoS attacks</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/gary-sockrider"><span itemProp="name"><span itemProp="givenName">Gary<!-- --> </span><span itemProp="familyName">Sockrider</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-25T07:00:00.000-04:00">April 25, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Top AI risks and fixes: Going beyond the Hype Cycle FUD"/><div class="d-flex"><div><a itemProp="url" href="/perspective/three-imminent-risks-of-ai-and-what-the-industry-should-do-about-them"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Top AI risks and fixes: Going beyond the Hype Cycle FUD</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/mike-britton"><span itemProp="name"><span itemProp="givenName">Mike <!-- --> </span><span itemProp="familyName">Britton </span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-24T07:00:00.000-04:00">April 24, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Navigating the ethical frontiers of our digital ecosystem"/><div class="d-flex"><div><a itemProp="url" href="/perspective/navigating-the-ethical-frontiers-of-our-digital-society"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Navigating the ethical frontiers of our digital ecosystem</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/callie-guenther-2"><span itemProp="name"><span itemProp="givenName">Callie <!-- --> </span><span itemProp="familyName">Guenther </span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-23T07:00:00.000-04:00">April 23, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check"/><div class="d-flex"><div><a itemProp="url" href="/perspective/bogged-down-by-siem-data-ingest-fees-3-strategies-to-keep-costs-in-check"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/kevin-paige-2"><span itemProp="name"><span itemProp="givenName">Kevin<!-- --> </span><span itemProp="familyName">Paige</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-22T17:11:00.000-04:00">April 22, 2024</time></p></div></div></article></li></ul><a class="layout-title-small font-weight-semibold" href="/perspective">More Perspectives</a></div></div><div itemscope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">In Brief</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="AI sparks increasing cyber concerns for execs amid growing adoption"/><div class="d-flex"><div><a itemProp="url" href="/brief/ai-sparks-increasing-cyber-concerns-for-execs-amid-growing-adoption"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">AI sparks increasing cyber concerns for execs amid growing adoption</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T10:03:00.000-04:00">April 26, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug"/><div class="d-flex"><div><a itemProp="url" href="/brief/updated-cisa-exploited-vulnerabilties-catalog-includes-windows-print-spooler-bug"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T10:03:00.000-04:00">April 26, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="More details on rural water system breach sought by legislators"/><div class="d-flex"><div><a itemProp="url" href="/brief/more-details-on-rural-water-system-breach-sought-by-legislators"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">More details on rural water system breach sought by legislators</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T09:45:00.000-04:00">April 26, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Phishing attack compromises LA County Health Services data"/><div class="d-flex"><div><a itemProp="url" href="/brief/phishing-attack-compromises-la-county-health-services-data"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Phishing attack compromises LA County Health Services data</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T09:37:00.000-04:00">April 26, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Android device hijacking facilitated by new Brokewell banking trojan"/><div class="d-flex"><div><a itemProp="url" href="/brief/android-device-hijacking-facilitated-by-new-brokewell-banking-trojan"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Android device hijacking facilitated by new Brokewell banking trojan</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-26T09:34:00.000-04:00">April 26, 2024</time></p></div></div></article></li></ul><a class="layout-title-small font-weight-semibold" href="/brief">More Briefs</a></div></div><div itemscope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">More Resources</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Compromised backups send ransomware recovery costs soaring"/><div class="d-flex"><div><a itemProp="url" href="/resource/compromised-backups-send-ransomware-recovery-costs-soaring"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Compromised backups send ransomware recovery costs soaring</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/george-v-hulme"><span itemProp="name"><span itemProp="givenName">George <!-- --> </span><span itemProp="additionalName">V. <!-- --> </span><span itemProp="familyName">Hulme</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-12T16:18:00.000-04:00">April 12, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Cloud security: Challenges and best practices"/><div class="d-flex"><div><a itemProp="url" href="/resource/cloud-security-challenges-and-best-practices"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Cloud security: Challenges and best practices</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/bill-brenner"><span itemProp="name"><span itemProp="givenName">Bill<!-- --> </span><span itemProp="familyName">Brenner</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-05T10:31:00.000-04:00">April 5, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="How cloud migration impacts modern network security"/><div class="d-flex"><div><a itemProp="url" href="/resource/how-cloud-migration-impacts-modern-network-security"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">How cloud migration impacts modern network security</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/paul-wagenseil"><span itemProp="name"><span itemProp="givenName">Paul<!-- --> </span><span itemProp="familyName">Wagenseil</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-04T18:10:00.000-04:00">April 4, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="How to evaluate and compare zero-trust platforms"/><div class="d-flex"><div><a itemProp="url" href="/resource/how-to-evaluate-and-compare-zero-trust-platforms"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">How to evaluate and compare zero-trust platforms</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/paul-wagenseil"><span itemProp="name"><span itemProp="givenName">Paul<!-- --> </span><span itemProp="familyName">Wagenseil</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-02T05:32:00.000-04:00">April 2, 2024</time></p></div></div></article></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2"><article itemProp="hasPart" itemscope="" itemType="https://schema.org/Article" class="gx-0 col-xl"><meta itemProp="headline" content="Foundational pillars of an effective zero-trust solution"/><div class="d-flex"><div><a itemProp="url" href="/resource/foundational-pillars-of-an-effective-zero-trust-solution"><h5 itemProp="name" class="SidebarList_blockTitle__3gS1q tmb-1 text-xlarge font-weight-semibold">Foundational pillars of an effective zero-trust solution</h5></a><p class="text-small tmb-1"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="m-0 text-small"><a itemProp="url" rel="author" href="/contributor/paul-wagenseil"><span itemProp="name"><span itemProp="givenName">Paul<!-- --> </span><span itemProp="familyName">Wagenseil</span></span></a></span></p><p class="m-0 text-small text-nowrap"><time class="" dateTime="2024-04-01T08:09:00.000-04:00">April 1, 2024</time></p></div></div></article></li></ul><a class="layout-title-small font-weight-semibold" href="/resource">MORE RESOURCES</a></div></div></div><div class="Regions_contentColumn__zwode content-column col-md-7"><section itemscope="" itemType="https://schema.org/Collection" class="ContentTeaser_sectionWrapper__MJJCo teaser-list"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0"><div class="teaser-list-wrapper"><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/resource/active-adversary-report-ransomware-hit-a-ceiling-but-security-teams-at-risk-for-more-pain"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Credit: Getty Images" loading="lazy" width="1024" height="294" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1024 294&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRhYBAABXRUJQVlA4IAoBAADQBgCdASoyAA4APpU4mEgloyKhMBgMALASiUATpll3/6RMczRrck7bBVcBehbIou3k+Rzjo6ngfVxXyvlBHwAA/v3bNgGtHSPV3G9VOz50c30xjZiwlmaq9wMkjTffXexBKQPKseY9AzbajeZxG1zKbN0kY/sjgiQDfNL4ypPqID9ILeG8WduKh6s2833sCdvGzkxPo54YbfHwr7juEfTSq+Jc/SifTO23HLOfZPuaUXcBu64ier6iP4JARCV8CFM3yB0VyyP4qcX7PpH8OOUWnC0o9V+zQ4vE7xYIYQEMWD60sy89wzMSKp03OiVvV3rvYDRQHtnYzssBamrI7eJj+l5/UPTZT8AAAA==&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/ransomware">Ransomware</a></div><a href="/resource/active-adversary-report-ransomware-hit-a-ceiling-but-security-teams-at-risk-for-more-pain"><h5 itemProp="headline" class="font-heading">Active adversary report: Ransomware hit a ceiling, but security teams at risk for more pain</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/george-v-hulme"><span itemProp="name"><span itemProp="givenName">George <!-- --> </span><span itemProp="additionalName">V. <!-- --> </span><span itemProp="familyName">Hulme</span></span></a></span><time class="non-interactive" dateTime="2024-04-19T14:23:00.000-04:00">April 19, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Despite a pause in the rise of ransomware, organizations are failing to take the steps necessary to adequately defend themselves against the increase in attacks to come.</p>
  4. </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/perspective/bogged-down-by-siem-data-ingest-fees-3-strategies-to-keep-costs-in-check"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="American cash banknotes money" loading="lazy" width="1280" height="800" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1280 800&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/governance-risk-and-compliance">Governance, Risk and Compliance</a></div><a href="/perspective/bogged-down-by-siem-data-ingest-fees-3-strategies-to-keep-costs-in-check"><h5 itemProp="headline" class="font-heading">Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/kevin-paige-2"><span itemProp="name"><span itemProp="givenName">Kevin<!-- --> </span><span itemProp="familyName">Paige</span></span></a></span><time class="non-interactive" dateTime="2024-04-22T17:11:00.000-04:00">April 22, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Solutions exist that let organizations adjust the volume of data being processed by their SIEM system.</p>
  5. </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/resource/how-cloud-migration-impacts-modern-network-security"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Credit: Adobe Stock Images" loading="lazy" width="2560" height="1440" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2560 1440&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRoYCAABXRUJQVlA4IHoCAAAQDgCdASoyABwAPmEqkEYkIqGhKBgNUIAMCWYArDMXw+E9uPVwDoGN4o/ciapPcsYBUOaeki786/NU9G+wB/I/6v0KvsW/rceLao+jJ0C6wzzSvl3GXZwXcg5PldOm44xTid7tIu+wPRt2IrQJUVbXNvIuPVwANj4AAP7/PpSwczohP2ZCBt5M8bY5yYPNfiPIyHap5xnZzKmIqWWzre/0/9UGIYS9z6SzsTWvDxckOm160zv+Jn9f8lWDwh0flk3vKY8MLqlrG06mzy9IYoUhFglPH7b/H/xftKz8MVhK9h2tLuKBZp63fagkwb5qSYeBfGQz6+sJ5Iv99dHyNBNBDZl6NC/t7+kjToynovTSPJHw3BC86v/2yl/4AnuoTv5X+PqJbZsVPErjBI6p2DEAcpXDLK1VwjRK8s1sBVj33jxd48jJK2Gri5qv5uJ5zvfVrP/a9zTHJlsFiiss4/wJZZnQzSBY8csy7ruU/PqjOPFHjmDjUaTjKP5BYwtDngG7Jvj/q+HG1f+DzQsatRwUjBIJ+eO++anwa9Fjb+bcBP/Zkrm1c/nEQ/Ntdt7xdO6nW9DzMtgiacGg54U7bi3s8pwmhj5PPkiremyCte3GfDRWXmqQtsAo3FnKwp42EcmZhN0iQVhjBDcdkgd/63EFNHJ+aI/gcfPs3vJdRaqKNdHet/94Wxy/fV7WqhUJlrqYNT0n7mxa3zYqBjN73YQ21Ik2Cw0rHJ/6/sqZPWDl9M2jyZ+pyEOvEDh+rWubabj+GkopwL5fYqjDJPdmxAEXc4ZNwW+M8bRBMiBzA7/suM+kcA3SrklDOmvg+ZJJ/EQgAy95kCv1EZAA&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/network-security">Network Security</a></div><a href="/resource/how-cloud-migration-impacts-modern-network-security"><h5 itemProp="headline" class="font-heading">How cloud migration impacts modern network security</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/paul-wagenseil"><span itemProp="name"><span itemProp="givenName">Paul<!-- --> </span><span itemProp="familyName">Wagenseil</span></span></a></span><time class="non-interactive" dateTime="2024-04-04T18:10:00.000-04:00">April 4, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Cloud computing improves scalability and may cut costs, but network-security practitioners may have difficulty adjusting. Here are some challenges and solutions of cloud-based network security.</p>
  6. </div></div></div></div></article><div id=":R2bt92km:"></div><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/cybersecurity-firm-darktrace-sold-to-thoma-bravo-for-5-3-billion"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="money background" loading="lazy" width="1280" height="800" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1280 800&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/aiml">AI/ML</a></div><a href="/news/cybersecurity-firm-darktrace-sold-to-thoma-bravo-for-5-3-billion"><h5 itemProp="headline" class="font-heading">Cybersecurity firm Darktrace sold to Thoma Bravo for $5.3 billion</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/stephen-weigand"><span itemProp="name"><span itemProp="givenName">Stephen<!-- --> </span><span itemProp="familyName">Weigand</span></span></a></span><time class="non-interactive" dateTime="2024-04-26T17:03:00.000-04:00">April 26, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>The acquisition comes a day after another cybersecurity firm, Rukrik, went public.</p>
  7. </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/kaiser-permanente-notifies-134m-patients-of-potential-data-exposure"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Kaiser Permanente medical care facility." loading="lazy" width="1094" height="730" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1094 730&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRrgEAABXRUJQVlA4IKwEAADQFgCdASoyACEAPi0ShkKhoQtXMpIMAWJYgCxHuN1P7d5jHPvVvvO0d5Y8d39w9gH4A9CXpk+YD9gP93/jPd69B3n/9SJ6AHlP+zJ+0v7Ie2Jd0NXf8dmh/U9EByBd2eRbvX9lzkXvWNRdV8kA9B7OL9K/8/3Bv1p9Jn2Jeh1+tJcYEO9kHgHwo+vL+0OefwPVag9FFhMaIby0IOkT95MO4fM2MP8Puimi7GPmIQDyymMTt3KSx3JRd5JUkYy2wAD+/fby+JNz8W/yNf6t/TX5XFUQ7K2aWXXnanTGB5HqxLRAmHxJgR73TTbOvBbpwpGZCN0hUitUQhCDfrQdmd8h2F/5Mb0FT9ViA331yeWQ1B8PXd3YEAd2p5///54pzhj3T+tR3qN8rYZbl6UXeI//48g/QvOv8IDaEM4FOMvjtkJ5+PCJ8+6jRfG3eKH3K3Vj9fcXDti4imWC28uZsfYbJw0XWaLJ/N5ZJdvuLCP6l3E2UdqR0i2OuVBzjEbVf+uGVT0RN6S67gctsgfH8cI8mhtw+voScD6FA2pu3Hx/9RtnwfkDrExRcRvXfU+dTJjRgvnH5c5yQFlQhm/oSztatougy0WLFuTYubN5Mj8kbYmJ0bdag75xV+iu5BhsGXWcEVS+1zbTeuUbSOkpjtl9dRkW7OqCOV5jqBylV+/E3rv4ZGGU4CH6dZb/2ZZg07sa8WUDmLBDWYD9sCI2CQ7YPjIodEjLuCX8ZRTahVP4CywzHRj0F/Xi0TCgHT2m5/qO+GiX/tdT7jn/wyth4VrIABpG7Eg3j/pHGhRVw/jQm3Q00alsbH7tiGtoFMzuj/J49/EXjfIz+gp8bPbyfksSSCsNFOIfw7zrvMGjsM4zOf+LAj56bZ7pDTgztf+TMnyUfwh6UuD8EZG1fyg16dv9mh9GNH6f9tZPbDkxBFm4XIxMqB5Esg3/tFFsPBKOtP+WxaEZFtXfY4XKzmzVwuBUsg11dNeQf666vVP+XVKf9H+7/3uLGr2lIvjMBxr7D49+y1nFVP86dHn1V4cZxyKHlhjKi2X/yWL1rKgY1qiyHgnXF+46FYRdwmAeWy7U1+WXfa2AT4qJjbEhWM7BttH7I7HwoExuiAGHKfwaSK05VP1j3xFo72keZnZ/NvvnY1ERmY35mltrOE3/hbGMBfQZE+YhuSt/V7mMJ5RmeH+ALDee/p1ETa+qtgpd91Z/bY0UPERhmf/wwpYM77KFnBbWH7gfbOI9qYNNxJArnWiIYNZYW6Y8AWC1b9OYbLxUPF5etkhahuWpaSGKIcT+Jev83dy9OCxeEsJcn5nADAZE5x4fhscH0PhZTzpObW754TqgUkXacP7bTvVt5JR4A7iGGhISJ/1lqhI39MPPDaKFqa3R9uBVyqtmVUGMLI5a7nH6oeMTxfASavHF/9roq+VwtfLd3jlQX5lcbyoeDGDlurS/vfTCa+Awli0u2ITYQwX0yY7EH+4394onPI3bhp+8UTnkrWu8P9Q8wkvgNG8SnOJw/mFWyTje2Q/g6Pc1B3ZCqL9ndjsjTc8mfqfu/GPPJ93ydkZPtYRrDl8FPFujcDMEV909Vg7ZzAAAAA==&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/identity">Identity</a></div><a href="/news/kaiser-permanente-notifies-134m-patients-of-potential-data-exposure"><h5 itemProp="headline" class="font-heading">Kaiser Permanente notifies 13.4M patients of potential data exposure</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/steve-zurier"><span itemProp="name"><span itemProp="givenName">Steve<!-- --> </span><span itemProp="familyName">Zurier</span></span></a></span><time class="non-interactive" dateTime="2024-04-26T14:17:00.000-04:00">April 26, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Patient data may have been transferred via apps to third-party vendors like Google, Microsoft and X.</p>
  8. </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/rubrik-ipo-signals-potential-cybersecurity-led-tech-market-revival"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="(Credit: Rafael Henrique &amp;#8211; stock.adobe.com)" loading="lazy" width="800" height="533" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 800 533&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/cloud-security">Cloud Security</a></div><a href="/news/rubrik-ipo-signals-potential-cybersecurity-led-tech-market-revival"><h5 itemProp="headline" class="font-heading">Rubrik IPO signals potential cybersecurity-led tech market revival</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/laura-french"><span itemProp="name"><span itemProp="givenName">Laura<!-- --> </span><span itemProp="familyName">French</span></span></a></span><time class="non-interactive" dateTime="2024-04-25T18:05:00.000-04:00">April 25, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Market experts say a resurgence of successful cybersecurity IPOs is likely on the way.</p>
  9. </div></div></div></div></article><div id=":R4bt92km:"></div><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/after-a-19-month-saga-broadcom-finally-patches-brocade-sannav-bugs"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="patch presented in the form of binary code" loading="lazy" width="900" height="600" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 900 600&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/application-security">Application security</a></div><a href="/news/after-a-19-month-saga-broadcom-finally-patches-brocade-sannav-bugs"><h5 itemProp="headline" class="font-heading">After a 19-month saga, Broadcom finally patches Brocade SANnav bugs</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/steve-zurier"><span itemProp="name"><span itemProp="givenName">Steve<!-- --> </span><span itemProp="familyName">Zurier</span></span></a></span><time class="non-interactive" dateTime="2024-04-25T15:59:00.000-04:00">April 25, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Security pros say given the complexity of SAN management tools, it’s understandable the patches took so long.</p>
  10. </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="d-lg-flex flex-lg-nowrap flex-lg-row justify-content-lg-start align-items-lg-stretch align-content-lg-stretch"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link me-lg-3 TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/cisco-firewalls-targeted-in-sophisticated-nation-state-espionage-hack"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="A sign with the Cisco logo is seen outside of a building" loading="lazy" width="1449" height="966" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1449 966&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg"/></div></a><div class="pt-3 pt-lg-0"><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/network-security">Network Security</a></div><a href="/news/cisco-firewalls-targeted-in-sophisticated-nation-state-espionage-hack"><h5 itemProp="headline" class="font-heading">Cisco firewalls targeted in sophisticated nation-state espionage hack</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/simon-hendery"><span itemProp="name"><span itemProp="givenName">Simon<!-- --> </span><span itemProp="familyName">Hendery</span></span></a></span><time class="non-interactive" dateTime="2024-04-25T11:14:00.000-04:00">April 25, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Security agencies sound alarm over campaign aimed at Cisco’s Adaptive Security Appliance software.</p>
  11. </div></div></div></div></article><div><div class="LoadMore_loadMoreWrapper__lWLYa container"><button type="button" disabled="" class="LoadMore_loadMoreButton__KKc12 btn active btn-outline-light btn-lg">Loading...</button></div></div></div></div></section></div><div class="Regions_contentColumn__zwode content-column col-md-3"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0"><div class="featured-image-wrapper FeaturedImage_featuredImageWrapper__Tu6_R"><a href="/sc-awards-2024-about"><img alt="" loading="lazy" width="2000" height="1125" decoding="async" data-nimg="1" class="featured-image FeaturedImage_featuredImage__hyCBv FeaturedImage_contain__MeBw0 featured-image-linked MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2000 1125&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,null&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 100vw,(max-width: 992px) 25vw,350px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png"/></a></div></div><div itemscope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">EVENTS</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scmagazine.com/cybercast/a-cisos-guide-to-data-governance-at-the-dawn-of-ai"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/a-cisos-guide-to-data-governance-at-the-dawn-of-ai"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">A CISOs Guide to Data Governance at the Dawn of AI</h5></a><p class="mb-0"><span class="text-small text-muted font-weight-semibold non-interactive"><meta itemProp="startDate" content="2024-05-09T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-09T15:00:00.000-04:00"/><time class="text-uppercase" dateTime="2024-05-09T14:00:00.000-04:00">Thu May 9</time></span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scmagazine.com/cybercast/ai-and-appsec-how-to-avoid-insecure-ai-generated-code"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/ai-and-appsec-how-to-avoid-insecure-ai-generated-code"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">AI and AppSec: How to avoid insecure AI-generated code</h5></a><p class="mb-0"><span class="text-small text-muted font-weight-semibold non-interactive"><meta itemProp="startDate" content="2024-05-14T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-14T15:00:00.000-04:00"/><time class="text-uppercase" dateTime="2024-05-14T14:00:00.000-04:00">Tue May 14</time></span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scmagazine.com/cybercast/4-key-takeaways-from-new-global-ai-security-guidelines"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/4-key-takeaways-from-new-global-ai-security-guidelines"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">4 key takeaways from new global AI security guidelines</h5></a><p class="mb-0"><span class="text-small text-muted font-weight-semibold non-interactive"><meta itemProp="startDate" content="2024-05-15T12:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-15T13:00:00.000-04:00"/><time class="text-uppercase" dateTime="2024-05-15T12:00:00.000-04:00">Wed May 15</time></span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scmagazine.com/cybercast/exposure-management-how-organizations-can-use-it-to-build-cyber-resilience"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/exposure-management-how-organizations-can-use-it-to-build-cyber-resilience"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Exposure management: How organizations can use it to build cyber resilience</h5></a><p class="mb-0"><span class="text-small text-muted font-weight-semibold non-interactive"><meta itemProp="startDate" content="2024-05-15T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-15T15:00:00.000-04:00"/><time class="text-uppercase" dateTime="2024-05-15T14:00:00.000-04:00">Wed May 15</time></span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scmagazine.com/cybercast/uncovering-a-year-of-phishing-data-latest-trends-and-tactics"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/uncovering-a-year-of-phishing-data-latest-trends-and-tactics"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Uncovering a year of phishing data: latest trends and tactics</h5></a><p class="mb-0"><span class="text-small text-muted font-weight-semibold non-interactive"><meta itemProp="startDate" content="2024-05-23T12:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-23T13:00:00.000-04:00"/><time class="text-uppercase" dateTime="2024-05-23T12:00:00.000-04:00">Thu May 23</time></span></p></div></li></ul></div></div><div class="Placeholder_box-pl__ptGbn slot_wrapper__JFKwH my-auto dfp-slot ad mb-3 pb-0 d-flex flex-column align-items-center"><div><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":Rv92km:"></div></div></div></div></div></div></div></main></div><div><div class="slot_wrapper__JFKwH d-none dfp-slot ad mb-3 pb-0 d-flex flex-column align-items-center"><div><div class="mx-auto" id=":R1akm:"></div></div></div></div></div><footer class="Footer_footerContainer__gOPdY pt-3 pb-5 font-tiltilium container-xxl"><hr class="Footer_topBorder__93LuI pt-5 pb-2 mx-auto"/><div class="justify-content-center row"><div class="col-lg-10"><div class="mb-1 row"><div class="col-lg-auto col-sm-12"><nav><div class="justify-content-center row"><div class="p-0 col-auto"><a title="SC Media" href="/"><svg xmlns="http://www.w3.org/2000/svg" viewBox="6.28 12.02 176.7 176.72" height="150" width="150"><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path></svg></a></div></div><div class="justify-content-center social-icons row"><div class="col-auto"><a title="SCMagazine on Facebook" class="d-flex p-0" target="_blank" href="https://www.facebook.com/SCMag/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" stroke="currentColor" viewBox="0 0 24 24" class="icon-primary facebook"><path fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="1.5" d="M17 2h-3a5 5 0 0 0-5 5v3H6v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3V2Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on Twitter" class="d-flex p-0" target="_blank" href="https://twitter.com/scmagazine"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="-2 -2 24 24" class="icon-primary twitter"><path fill="currentColor" stroke="currentColor" stroke-width="0.625" d="m11.617 8.66 6.33-7.41h-1.5l-5.494 6.434-4.39-6.434H1.5l6.637 9.73L1.5 18.75H3l5.803-6.795 4.636 6.795H18.5L11.617 8.66Zm-2.053 2.405-.673-.969L3.54 2.388h2.304l4.317 6.22.673.97 5.614 8.087h-2.304l-4.58-6.6Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on LinkedIn" class="d-flex p-0" target="_blank" href="https://www.linkedin.com/company/scmediaus/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" class="icon-primary linkedin"><path fill="currentColor" d="M19.868 2.625H4.132c-.832 0-1.507.675-1.507 1.507v15.736c0 .832.675 1.507 1.507 1.507h15.736c.832 0 1.507-.675 1.507-1.507V4.132c0-.832-.675-1.507-1.507-1.507Zm0 17.25c-10.495-.002-15.743-.005-15.743-.007.002-10.495.005-15.743.007-15.743 10.495.002 15.743.005 15.743.007a13277.3 13277.3 0 0 1-.007 15.743ZM5.405 9.654h2.782v8.948H5.405V9.654ZM6.797 8.43a1.614 1.614 0 0 0 .617-3.102 1.613 1.613 0 1 0-.617 3.102Zm5.913 5.745c0-1.167.223-2.297 1.669-2.297 1.425 0 1.446 1.334 1.446 2.372v4.352h2.78v-4.908c0-2.409-.52-4.263-3.335-4.263-1.353 0-2.26.743-2.633 1.446H12.6V9.654H9.93v8.948h2.78v-4.427Z"></path></svg></a></div></div></nav></div><div class="offset-lg-1 col"><nav class="pb-0 pt-2 navbar navbar-expand navbar-light"><div class="container-xxl"><div class="nav-fill d-flex flex-lg-row flex-column justify-content-center w-100 fs-9 navbar-nav"><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC fs-5 d-block text-uppercase py-0 py-lg-2 px-3 non-interactive">About Us</h5><a class="FooterMenu_link__4UH_H" href="/about-us">SC Media</a><a class="FooterMenu_link__4UH_H" target="_blank" href="https://www.cyberriskalliance.com/">CyberRisk Alliance</a><a class="FooterMenu_link__4UH_H" href="/contact-us">Contact Us</a><a class="FooterMenu_link__4UH_H" target="_blank" href="https://www.cyberriskalliance.com/careers/">Careers</a><a class="FooterMenu_link__4UH_H" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC fs-5 d-block text-uppercase py-0 py-lg-2 px-3 non-interactive">Get Involved</h5><a class="FooterMenu_link__4UH_H" target="_blank" href="https://pages.scmagazine.com/SC_NL_OptIn-LP.html">Subscribe</a><a class="FooterMenu_link__4UH_H" href="/contribute">Contribute/Speak</a><a class="FooterMenu_link__4UH_H" href="/virtual-conferences">Attend an event</a><a class="FooterMenu_link__4UH_H" target="_blank" href="https://cybersecuritycollaboration.com/">Join a peer group</a><a class="FooterMenu_link__4UH_H" href="/become-a-sponsor">Partner With Us</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC fs-5 d-block text-uppercase py-0 py-lg-2 px-3 non-interactive">Explore</h5><a class="FooterMenu_link__4UH_H" href="/sw-labs">Product reviews</a><a class="FooterMenu_link__4UH_H" href="/cra-business-intelligence">Research</a><a class="FooterMenu_link__4UH_H" href="/resource-library">White papers</a><a class="FooterMenu_link__4UH_H" href="/webcasts">Webcasts</a><a class="FooterMenu_link__4UH_H" href="/security-weekly">Podcasts</a></div></div></div></nav></div></div><div class="justify-content-center fs-10 row"><div class="col"><div class="non-interactive text-center text-lg-start"><p class="m-0">
  12.        Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved.
  13.        This material may not be published, broadcast, rewritten or redistributed
  14.        in any form without prior authorization.
  15.      </p><p class="m-0"><span>Your use of this website constitutes acceptance of CyberRisk Alliance </span><a class="text-underline cursor-pointer" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a><span> and </span><a class="text-underline cursor-pointer" href="/terms-and-conditions">Terms &amp; Conditions</a><span>.</span></p></div></div></div></div></div></footer></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"title":"SCM – Homepage","layouts":[{"machineName":"hero__1_column","layoutOptions":[],"designTheme":"light","className":[],"backgroundImage":null,"backgroundStyles":null,"style":{},"columns":[{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_Ad","name":"leaderboard-small","disableRotation":true,"targetingOptions":{"sid":"home"}}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}}]},{"machineName":"hero__2_columns__8_4","layoutOptions":[],"designTheme":"light","className":[],"backgroundImage":null,"backgroundStyles":null,"style":{},"columns":[{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_FeaturedFeedPost","postDeck":"","options":["showCaption"],"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTc4ODk=","databaseId":717889,"title":"Will the Change Healthcare case finally make providers do a business impact analysis?","uri":"/perspective/will-the-change-healthcare-case-finally-make-providers-do-a-business-impact-analysis","date":"2024-04-22T07:00:00","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","link":"https://www.scmagazine.com/topic/ransomware","uri":"/topic/ransomware","name":"Ransomware","slug":"ransomware"}],"type":{"name":"Perspective","slug":"perspective"},"podcastShow":null},"authorCollection":{"author":[{"title":"Toby Gouker","uri":"/contributor/toby-gouker","slug":"toby-gouker","peopleAdvanced":{"firstName":"Toby ","middleName":null,"lastName":"Gouker "}}]},"editorialAdvanced":{"deck":"\u003cp\u003eThe industry has talked about BIAs for years – and most providers still lean on cyber insurance in the wake of attack. That has to change. \u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/041924_united_healthcare.jpg","altText":"UnitedHealthcare's Change Healthcare","caption":"\u003cp\u003eIn the wake of UnitedHealth’s admission that the Change Healthcare attack will cost it $1.6 billion, today’s columnist, Toby Gouker of First Health Advisory, explains why providers have to conduct a business impact analysis and depend less on cyber insurance. (Adobe Stock)\u003c/p\u003e\n","title":"UnitedHealthcare headquarters in Minnetonka, Minnesota, USA, May","mediaDetails":{"width":1021,"height":681},"mediaAdvanced":{"lqip":"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"}}}}]},"postTitle":null,"customLink":null,"image":null,"customTextColor":null,"customBackgroundColor":null}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}},{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_FeaturedPost","title":null,"subtitle":null,"postDeck":"","options":null,"resolvedPostCollection":{"nodes":[{"__typename":"PpworksSegment","id":"cG9zdDo3MDQ1NDQ=","title":"How GenAI Can Improve SecOps – Ely Kahn – ESW #359","uri":"/podcast-segment/12785-how-genai-can-improve-secops-ely-kahn-esw-359","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/ESW_359_seg_2__61543639-5761-4cd3-a908-9eec1ae92663.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12785″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}}},"ppworksSegmentAdvanced":{"topics":[{"__typename":"Topic","id":"dGVybTo3NDYxMQ==","link":"https://www.scmagazine.com/topic/aiml","uri":"/topic/aiml","name":"AI/ML","slug":"aiml"},{"__typename":"Topic","id":"dGVybTo3NDYxMw==","link":"https://www.scmagazine.com/topic/security-operations","uri":"/topic/security-operations","name":"Security Operations","slug":"security-operations"},{"__typename":"Topic","id":"dGVybTo3NDYyMg==","link":"https://www.scmagazine.com/topic/threat-hunting","uri":"/topic/threat-hunting","name":"Threat Hunting","slug":"threat-hunting"}]}}]},"postTitle":"An Enterprise Security Weekly Roundtable on trusting autonomous security products to protect and serve - no humans need apply.   ","customLink":null,"image":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/ent-security-weekly-v2.jpg","altText":"","caption":null,"title":"ent security weekly v2","mediaDetails":{"width":1128,"height":630},"mediaAdvanced":{"lqip":"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"}}},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_Ad","name":"box-medium","disableRotation":null,"targetingOptions":{"sid":null}}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}}]},{"machineName":"hero__2_columns__8_4","layoutOptions":[],"designTheme":"light","className":[],"backgroundImage":null,"backgroundStyles":null,"style":{},"columns":[{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_HorizontalListWithImage","title":"RESOURCES","titleLink":null,"designTheme":"mobileCarousel","imagePosition":"flex-column","numberOfItems":5,"numberOfColumns":null,"openNewTab":null,"options":null,"ctaLinks":null,"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTk0MTg=","title":"Impact of organizational structure on ransomware outcomes: Where does your org fit in?","uri":"/resource/impact-of-organizational-structure-on-ransomware-outcomes-where-does-your-org-fit-in","databaseId":719418,"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","link":"https://www.scmagazine.com/topic/ransomware","uri":"/topic/ransomware","name":"Ransomware","slug":"ransomware"}],"type":{"slug":"resource"}},"authorCollection":{"author":[{"title":"George V. Hulme","uri":"/contributor/george-v-hulme","slug":"george-v-hulme","peopleAdvanced":{"firstName":"George ","middleName":"V. ","lastName":"Hulme"}}]},"editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/02/020924_cyberattack.jpg","altText":"","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"","mediaDetails":{"width":1200,"height":675},"mediaAdvanced":{"lqip":"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"}}}},{"__typename":"Editorial","id":"cG9zdDo3MTc4NjI=","title":"Active adversary report: Ransomware hit a ceiling, but security teams at risk for more pain","uri":"/resource/active-adversary-report-ransomware-hit-a-ceiling-but-security-teams-at-risk-for-more-pain","databaseId":717862,"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","link":"https://www.scmagazine.com/topic/ransomware","uri":"/topic/ransomware","name":"Ransomware","slug":"ransomware"}],"type":{"slug":"resource"}},"authorCollection":{"author":[{"title":"George V. Hulme","uri":"/contributor/george-v-hulme","slug":"george-v-hulme","peopleAdvanced":{"firstName":"George ","middleName":"V. ","lastName":"Hulme"}}]},"editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg","altText":"","caption":"\u003cp\u003eCredit: Getty Images\u003c/p\u003e\n","title":"","mediaDetails":{"width":1024,"height":294},"mediaAdvanced":{"lqip":"UklGRhYBAABXRUJQVlA4IAoBAADQBgCdASoyAA4APpU4mEgloyKhMBgMALASiUATpll3/6RMczRrck7bBVcBehbIou3k+Rzjo6ngfVxXyvlBHwAA/v3bNgGtHSPV3G9VOz50c30xjZiwlmaq9wMkjTffXexBKQPKseY9AzbajeZxG1zKbN0kY/sjgiQDfNL4ypPqID9ILeG8WduKh6s2833sCdvGzkxPo54YbfHwr7juEfTSq+Jc/SifTO23HLOfZPuaUXcBu64ier6iP4JARCV8CFM3yB0VyyP4qcX7PpH8OOUWnC0o9V+zQ4vE7xYIYQEMWD60sy89wzMSKp03OiVvV3rvYDRQHtnYzssBamrI7eJj+l5/UPTZT8AAAA=="}}}},{"__typename":"Editorial","id":"cG9zdDo3MTY1MzI=","title":"The evolution of privilege: How to secure your organization in an era of escalating workforce privileges","uri":"/resource/how-todays-users-can-escalate-privileges-at-any-time-and-what-to-do-about-it","databaseId":716532,"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwNQ==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","children":{"nodes":[{"id":"dGVybTo3NDY0Nw=="},{"id":"dGVybTo3NDY0OA=="},{"id":"dGVybTo3NDYwNQ=="},{"id":"dGVybTo3NDU5Nw=="},{"id":"dGVybTo3NDY0OQ=="},{"id":"dGVybTo3NDY0Ng=="}]}},{"__typename":"Topic","id":"dGVybTo3NDY0OQ==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","link":"https://www.scmagazine.com/topic/identity","uri":"/topic/identity","name":"Identity","slug":"identity"},{"__typename":"Topic","id":"dGVybTo3NDYwNQ==","link":"https://www.scmagazine.com/topic/iam-technologies","uri":"/topic/iam-technologies","name":"IAM Technologies","slug":"iam-technologies"},{"__typename":"Topic","id":"dGVybTo3NDY0OQ==","link":"https://www.scmagazine.com/topic/privileged-access-management","uri":"/topic/privileged-access-management","name":"Privileged access management","slug":"privileged-access-management"}],"type":{"slug":"resource"}},"authorCollection":{"author":[{"title":"Paul Wagenseil","uri":"/contributor/paul-wagenseil","slug":"paul-wagenseil","peopleAdvanced":{"firstName":"Paul","middleName":null,"lastName":"Wagenseil"}}]},"editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2022/07/072022_password_login.jpg","altText":"A woman is silhouetted against a projection of a password log-in dialog box.","caption":"\u003cp\u003eA woman is silhouetted against a projection of a password log-in dialog box. (Photo by Leon Neal/Getty Images)\u003c/p\u003e\n","title":"Cyber Security Concerns In The Global Wake of Hacking Threat","mediaDetails":{"width":1500,"height":1003},"mediaAdvanced":{"lqip":"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"}}}},{"__typename":"Editorial","id":"cG9zdDo3MTcyMTY=","title":"Identity security and user experience: Where balance can be achieved","uri":"/resource/identity-security-and-user-experience-where-balance-can-be-achieved","databaseId":717216,"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDY0OA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","children":{"nodes":[{"id":"dGVybTo3NDY0Nw=="},{"id":"dGVybTo3NDY0OA=="},{"id":"dGVybTo3NDYwNQ=="},{"id":"dGVybTo3NDU5Nw=="},{"id":"dGVybTo3NDY0OQ=="},{"id":"dGVybTo3NDY0Ng=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","link":"https://www.scmagazine.com/topic/identity","uri":"/topic/identity","name":"Identity","slug":"identity"},{"__typename":"Topic","id":"dGVybTo3NDY0OA==","link":"https://www.scmagazine.com/topic/decentralized-identity-and-verifiable-credentials","uri":"/topic/decentralized-identity-and-verifiable-credentials","name":"Decentralized identity and verifiable credentials","slug":"decentralized-identity-and-verifiable-credentials"}],"type":{"slug":"resource"}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/05/GettyImages-115049939.jpg","altText":"","caption":null,"title":"Business man \u0026 business woman doing tug of war","mediaDetails":{"width":2038,"height":1471},"mediaAdvanced":{"lqip":"UklGRmADAABXRUJQVlA4IFQDAADQFQCdASoyACQAPgkCgUCBVQAAEJZwDSY7ipeqnETzgH7Jb4B/dv7d1gHogfqB6Vn7AfBf+3PpRUeT8Sf2Z3QDtXvVfxy0TP9A/D38kM4C+Sf0j8cv5B+s2wJf2j8cNdn/Zvty+LL+q/G71ofQv9y/Hf6A/4n/If6X+RX9t///KP/peoFZCGnq7GXOl5M3+YwoI007qNZDPH8PN0CfT3dyTnRbNN2ssEEB/0SAigso8u6E3FedfAAA/v//Ks93nMuBGc21VNoNICUEaUUREZGhyOJPxMNCM3jtbkrt9ZEosatqV+hWhFL42KNwD/+vE+pJWN94GeLkAWPu6CqIiuLYDkG6rjKxWf+QPkdRNn+9PnxDApXA/yRv5zTqioOkvqg3wGlrnZdy59OTafW6FUGS7IxcIdIsAT/0dahbAfhf2c5XViLzAhO2z93BwKiaoS0+e0JrvN9DyoehZOzU11cg8wv0pH71k8jq9x7Erv1iU6oEqWXQsUM5/K3mRvZmUtDGwRkH+k8yfW6myDCXSver0/AXXDkZArom3ZMOFcI/nSfkEy0leRpo34Z21SWgWNevg9wG39h+cRjORgaHUwDGSpB5dUTwZpmXRFS6Kr7/PXfS2dAEOUV98kO6Dza8TL8QUJ4I9mzM1nhsJRFbo+pKvFbmzbJrt//dR3eIrQ/I+Z5wZs+HOruH/T6AIZxPUeX6robPeX17nGs/XcBG3LMY4USvcO11nUR5hnYrn5u8IujKTZ4dhHNU4Ix4B/jg66YwEMPXrTLkR/427jsPx/h8OuTb0y92b/2uEqd9P0JO9pk+BjfF6KKk9VZwX4Vd+Z9kxuNn803mkQ6LLtREYoV6Gqh7X6hD9+ggPU0EAaWJA6qlNbtImu3uTbEjeCcR7c0uv+OBmjSADE5ptePwXGCHp+pbIkfRMPwjRRehqOu0n3yEkL+07D38xxK8hHXf69LbfkxwrP25aET5J9TLYF9iqFKqnApGEVTl8xLtKq4fsy4JOdTWGoceeV+2T8/L7e/EW4wSeNQQwDRIyXi/oxv445mB/ZIEySGzY50OdeJZjCVS5ZzQxdEGkLQUf1kdPZ75ANeTiTft3zxw8343YdMDxDI4UDuFQ6BOoPfNOTxwNOoAAAA="}}}},{"__typename":"Editorial","id":"cG9zdDo3MTcwMDc=","title":"Why identity has become a Trojan horse, and what to do about it","uri":"/resource/why-identity-has-become-a-trojan-horse-and-what-to-do-about-it","databaseId":717007,"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","children":{"nodes":[{"id":"dGVybTo3NDY0Nw=="},{"id":"dGVybTo3NDY0OA=="},{"id":"dGVybTo3NDYwNQ=="},{"id":"dGVybTo3NDU5Nw=="},{"id":"dGVybTo3NDY0OQ=="},{"id":"dGVybTo3NDY0Ng=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyNQ==","children":{"nodes":[]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","link":"https://www.scmagazine.com/topic/identity","uri":"/topic/identity","name":"Identity","slug":"identity"},{"__typename":"Topic","id":"dGVybTo3NDYyNQ==","link":"https://www.scmagazine.com/topic/zero-trust","uri":"/topic/zero-trust","name":"Zero trust","slug":"zero-trust"}],"type":{"slug":"resource"}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/03/031023_trojan_malware.jpg","altText":"Trojan horse virus","caption":"\u003cp\u003eTrojan horse virus (Adobe Stock Images)\u003c/p\u003e\n","title":"","mediaDetails":{"width":1280,"height":800},"mediaAdvanced":{"lqip":"UklGRk4FAABXRUJQVlA4IEIFAAAwGgCdASoyAB8APj0WiEOiISEb9AAgA8S2AE6ZQjgb3jzBK6/a9g4KDCb22fmA+wD3yPQxvC3oAeCB8IP96/6FgofOfxc8x++j4i9n+IJwB5gfPL9Z5F94O0p/fPlmzmL5f/nP6r4VuoF249Bv85/0/kV+AN8N/m3+Z9wD+Jf0r/fex1/B/7n+7flJ7Kfm3/af3T4Av45/MP8X/Z/3e/xH/18KX7Lewt+o5RSWUPzw5LZNBn/BHDieDUtF5XNuE2LE9ERf342KzHL9iqm5qc+WXf/HlT+f+bL6YAD+9nS4kheKXSTEbF/HEByvPbFkr3vz/kmxG/9a8pYP6dNAI4GmGrfFi9Wnu+3uQjBfwa2TWO3HgiNisofp6Gzf8B3d3lUb7Yp25qJG+c71f/pCnsirEBzrBlpOysDAktEggrkvyBq+svWtl6K5RkxOx8uHbB5n/VE+RFLWGurl+OQwMQZl0B0hykx/kAwPltxCX7FUtZHtM21vwRQCVmQmUP7DHt5jFjin4FMsHD/0XCWMlwsnH75Bh32kggR8g63I3PslSusancyzj2Qw0rGfAY+aPFM8cy2HCy43+HxPwUgSXnc3eQ94jI4RdZ5+/HFAsJMH3bsVgwitfVM8oEG9QvyiiKJtzw345d/lkoZAMNeXQNmZY843xYPH+TdYowuXtIQr9WVvXS5pmQ1V1t0wrpNua7bNfKmgDISr1ASI+RI2vTnEOnLCTA6M8m/n/tYNtA+vcN9LSw2CDN55Jc5MAXFmu0PeeHEiA4fZLWlHR18oEMCQFiwNZqOdVoYevU25HU+8VfdUn6sax6DobLAiXNj9On1t/1YbtyvNHfsSdeGHVWKkjdfEtPcxdJDDRHy3b+vI5L7+R9CdirbTji+4jkp3OrXqYOHEVyX2gI3sSSajwtlJVPDJu77nVbsdw7WXJbuHjAP0OZzt2s6wRvcDa7b/7baePEN6dx0r4ihgqCgBdO3uWyuAJ1eiK74CEMp4BEfI+G3l963Aq3r0/8n8Yj/5P9kEDWbsZMJRz6W7cPt7+c9MD7lbCFAb4g0I275bYhtb4HAzLtVrC3h/50m7oLNaQllxoRyBLOaqiJW7MMINWkEYz4Sl9KqU1ynaC0cL06JJxtUe+wVulSgOvoaw+tMq+zvxEhs62X+/BEwaRYYHAr5G0hW7efMVEyoVDEQyQvL8RB/sOmAfL+LBnkt1eZnoh8D7dxd7/8Y3x73STPHRBwj2I8bJU1m545WHgDffRsrkfCSJEHMJWxSkDqTuN2tPNPIxuYuTkr/6NF+NBtSswp6G3SukrzBjlAbrM0sP2K8VJqkSJCPoabspZQhWQpnnonICYHXGM2E4GvVPd6mdj4JX05YOJZ/g8BOoEGXqSG68dRTegHwxlWC4jZPzl/55hrPfXP5uiyRthEAZLatX+W0J7wnzoVkMMfSxk7MJ8SJB/gHxiwWBvEhg4e/TBFWvE1NRFKMFqmYgJH5WW9Lerp5XZQaZHZ4KXCeqd/GDK0kXpg6gsvxwQNbkq8/U+0nMf+6mP8v3oN0w86E6gSzl/ONIGE72euYxHJMD65qi/749RAqw5RU17xdHldlyoZTa/E8/jmjXfuc82rFNnWur4wsZ5go7XqOJlqUnEGJ4Q9md2TKzBe626MHESATSkRqqnYp99r+lyo/Bb6mLpVrrq+WNQ//H/XASw8QFa6tzhkXuPMFNCmbLv0gdJcrkBsnwy7JPu56mytjcmn+xu9lJv8xfv9OI0ZF4ek87ru/wkx3d/6LoreHYKj+5Fuq7/9kW50AAAA=="}}}}]},"collection":null,"customTextColor":null,"customBackgroundColor":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_HorizontalListWithImage","title":"PODCASTS","titleLink":null,"designTheme":"mobileCarousel","imagePosition":"flex-column","numberOfItems":5,"numberOfColumns":null,"openNewTab":null,"options":null,"ctaLinks":null,"resolvedPostCollection":{"nodes":[{"__typename":"PpworksSegment","id":"cG9zdDo3MDM2MDY=","dateGmt":"2024-04-26T16:00:00","databaseId":703606,"title":"TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland – SWN #381","uri":"/podcast-segment/12591-tiktok-flowmon-cisco-brokewell-ruggedcom-deepfakes-non-competes-aaran-leyland-swn-381","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/SWN_381_8e96df22-0c76-4487-88e6-66a22a04f41f.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12591″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}},"s3Video":"https://files.securityweekly.com/SWN_381_1--9866c4a5-fa75-402a-8d7a-e7842464e52e.mp4","youtubeId":"C_3Y3xT_Y2I"},"ppworksSegmentAdvanced":{"episode":{"ppworksEpisodeAdvanced":{"number":381}},"topics":[{"__typename":"Topic","id":"dGVybTo3NDU3Nw==","link":"https://www.scmagazine.com/topic/vulnerability-management","uri":"/topic/vulnerability-management","name":"Vulnerability Management","slug":"vulnerability-management"},{"__typename":"Topic","id":"dGVybTo3NDYyNg==","link":"https://www.scmagazine.com/topic/malware","uri":"/topic/malware","name":"Malware","slug":"malware"},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","link":"https://www.scmagazine.com/topic/government-regulations","uri":"/topic/government-regulations","name":"Government Regulations","slug":"government-regulations"}]}},{"__typename":"PpworksSegment","id":"cG9zdDo3MDQ1NDM=","dateGmt":"2024-04-25T19:00:00","databaseId":704543,"title":"Threat Modeling and Understanding Inherent Threats – Adam Shostack – ESW #359","uri":"/podcast-segment/12784-threat-modeling-and-understanding-inherent-threats-adam-shostack-esw-359","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/ESW_359_seg_3_44ad8bf0-1bd4-46e1-a12e-7660da8a435a.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12784″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}},"s3Video":"https://files.securityweekly.com/ESW_359_3--67581a5a-3714-447b-ade7-28fbf62f7eb0.mp4","youtubeId":"31Yr-uON8VU"},"ppworksSegmentAdvanced":{"episode":{"ppworksEpisodeAdvanced":{"number":359}},"topics":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","link":"https://www.scmagazine.com/topic/breach","uri":"/topic/breach","name":"Breach","slug":"breach"},{"__typename":"Topic","id":"dGVybTo3NDYxMw==","link":"https://www.scmagazine.com/topic/security-operations","uri":"/topic/security-operations","name":"Security Operations","slug":"security-operations"},{"__typename":"Topic","id":"dGVybTo3NDYxOQ==","link":"https://www.scmagazine.com/topic/threat-management","uri":"/topic/threat-management","name":"Threat Management","slug":"threat-management"}]}},{"__typename":"PpworksSegment","id":"cG9zdDo3MDc2Nzg=","dateGmt":"2024-04-25T04:00:00","databaseId":707678,"title":"Autonomous – I don’t think that word means what you think it means – ESW #359","uri":"/podcast-segment/12855-autonomous-i-dont-think-that-word-means-what-you-think-it-means-esw-359","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/ESW_359_seg_1__46c02e8f-2342-48f8-80f1-c90b35bcbb16.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12855″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}},"s3Video":"https://files.securityweekly.com/ESW_359_1--ca916758-f008-428c-9e1e-78505f8f4d25.mp4","youtubeId":"XJcRkInw_OI"},"ppworksSegmentAdvanced":{"episode":{"ppworksEpisodeAdvanced":{"number":359}},"topics":[{"__typename":"Topic","id":"dGVybTo3NDU3NQ==","link":"https://www.scmagazine.com/topic/application-security","uri":"/topic/application-security","name":"Application security","slug":"application-security"},{"__typename":"Topic","id":"dGVybTo3NDYxMQ==","link":"https://www.scmagazine.com/topic/aiml","uri":"/topic/aiml","name":"AI/ML","slug":"aiml"},{"__typename":"Topic","id":"dGVybTo3NDYxMw==","link":"https://www.scmagazine.com/topic/security-operations","uri":"/topic/security-operations","name":"Security Operations","slug":"security-operations"}]}},{"__typename":"PpworksSegment","id":"cG9zdDo3MDQwNzY=","dateGmt":"2024-04-24T21:00:00","databaseId":704076,"title":"Your TV Is Scanning You – PSW #826","uri":"/podcast-segment/12752-your-tv-is-scanning-you-psw-826","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/PSW_826_seg_2_69e8792f-f9ec-40e4-9741-410394b44ac0.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12752″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}},"s3Video":"https://files.securityweekly.com/PSW_826_2--2af434c6-0a93-4417-9492-d0e01a9ea623.mp4","youtubeId":"8vLZh4jit0Y"},"ppworksSegmentAdvanced":{"episode":{"ppworksEpisodeAdvanced":{"number":826}},"topics":[{"__typename":"Topic","id":"dGVybTo3NDYwNg==","link":"https://www.scmagazine.com/topic/supply-chain","uri":"/topic/supply-chain","name":"Supply chain","slug":"supply-chain"},{"__typename":"Topic","id":"dGVybTo3NDU4NQ==","link":"https://www.scmagazine.com/topic/iot","uri":"/topic/iot","name":"IoT","slug":"iot"},{"__typename":"Topic","id":"dGVybTo3NDU4Nw==","link":"https://www.scmagazine.com/topic/firewalls-routers","uri":"/topic/firewalls-routers","name":"Firewalls, Routers","slug":"firewalls-routers"}]}},{"__typename":"PpworksSegment","id":"cG9zdDo3MDQwNzU=","dateGmt":"2024-04-24T09:00:00","databaseId":704075,"title":"Advising The President On Cyber-Physical Resilience – Philip Venables – PSW #826","uri":"/podcast-segment/12751-advising-the-president-on-cyber-physical-resilience-philip-venables-psw-826","ppworksPodcastBasic":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/PSW_826_Thumbnail_64a902fa-95da-48e8-9ef0-e7fa246f612b.jpg","altText":"","caption":null,"title":"Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12751″} podcast from PPWorks","mediaDetails":{"width":1920,"height":1080},"mediaAdvanced":{"lqip":"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"}},"s3Video":"https://files.securityweekly.com/PSW_826_1--829de2e8-f6de-46c2-a2ba-05251adc2606.mp4","youtubeId":"juEUs_lh5ZY"},"ppworksSegmentAdvanced":{"episode":{"ppworksEpisodeAdvanced":{"number":826}},"topics":[{"__typename":"Topic","id":"dGVybTo3NDU5NA==","link":"https://www.scmagazine.com/topic/critical-infrastructure-security","uri":"/topic/critical-infrastructure-security","name":"Critical Infrastructure Security","slug":"critical-infrastructure-security"},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","link":"https://www.scmagazine.com/topic/government-regulations","uri":"/topic/government-regulations","name":"Government Regulations","slug":"government-regulations"},{"__typename":"Topic","id":"dGVybTo3NDU4NA==","link":"https://www.scmagazine.com/topic/ot-security","uri":"/topic/ot-security","name":"OT Security","slug":"ot-security"}]}}]},"collection":null,"customTextColor":null,"customBackgroundColor":null}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}},{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_FeaturedPost","title":"FEATURED","subtitle":null,"postDeck":"","options":null,"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MDg5ODY=","title":"Call for 2024 SC Awards nominations","uri":"/news/call-for-2024-sc-awards-nominations","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYxMQ==","children":{"nodes":[{"id":"dGVybTo3NDYzNw=="},{"id":"dGVybTo3NDYzOA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDY0MA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mg==","children":{"nodes":[{"id":"dGVybTo3NDU4Nw=="},{"id":"dGVybTo3NDU4OA=="},{"id":"dGVybTo3NDY1MA=="},{"id":"dGVybTo3NDU4OQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","link":"https://www.scmagazine.com/topic/cloud-security","uri":"/topic/cloud-security","name":"Cloud Security","slug":"cloud-security"},{"__typename":"Topic","id":"dGVybTo3NDY0MA==","link":"https://www.scmagazine.com/topic/api-security","uri":"/topic/api-security","name":"API security","slug":"api-security"},{"__typename":"Topic","id":"dGVybTo3NDU4Mg==","link":"https://www.scmagazine.com/topic/network-security","uri":"/topic/network-security","name":"Network Security","slug":"network-security"},{"__typename":"Topic","id":"dGVybTo3NDYxMQ==","link":"https://www.scmagazine.com/topic/aiml","uri":"/topic/aiml","name":"AI/ML","slug":"aiml"}],"type":{"slug":"news"},"podcastShow":null},"editorialAdvanced":{"deck":"\u003cp\u003eStarting now we officially welcome your to nominate your top products, solutions and standout individuals.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/2024-SC-Awards-Logo-Extended.jpg","altText":"","caption":null,"title":"2024 SC Awards Logo Extended","mediaDetails":{"width":1200,"height":700},"mediaAdvanced":{"lqip":"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"}}}}]},"postTitle":null,"customLink":null,"image":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_MarketoForm","marketFormId":1349,"template":"sc_daily_scan","customBackgroundColor":null,"customTextColor":null}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}}]},{"machineName":"content__3_columns__2_7_3","layoutOptions":[],"designTheme":"light","className":[],"backgroundImage":null,"backgroundStyles":null,"style":{},"columns":[{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_SimpleList","title":"Perspectives","subtitle":null,"ctaLink":{"title":"More Perspectives","url":"/perspective"},"options":[],"collection":null,"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTkyMDQ=","title":"Five ways security leaders can demonstrate the business value of cybersecurity","uri":"/perspective/five-ways-security-leaders-can-demonstrate-the-business-value-of-cybersecurity","date":"2024-04-26T07:00:00","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/0425_computer_science.jpg","altText":"Business value of cybersecurity","caption":"\u003cp\u003eToday’s columnist, Steve Durbin of the Information Security Forum, offers five tips for security leaders to convince the boardroom that they understand the business. (Adobe Stock)\u003c/p\u003e\n","title":"Project Manager and Computer Science Engineer Talking while Usin","mediaDetails":{"width":1280,"height":720},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Steve Durbin","uri":"/contributor/steve-durbin","slug":"steve-durbin","peopleAdvanced":{"firstName":"Steve ","middleName":null,"lastName":"Durbin"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTg5NDQ=","title":"How an adaptive approach can stop AI-based DDoS attacks","uri":"/perspective/how-an-adaptive-approach-can-stop-ai-based-ddos-attacks","date":"2024-04-25T07:00:00","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/041624_big_data_ai.jpg","altText":"How to use AI to protect against DDoS attacks","caption":"\u003cp\u003e(Adobe Stock) \u003c/p\u003e\n","title":"Big data and artificial intelligence concept.","mediaDetails":{"width":1366,"height":768},"mediaAdvanced":{"lqip":"UklGRuQDAABXRUJQVlA4INgDAACQEwCdASoyABwAPi0Sh0KhoQsGqswMAWJZACdMyYCz6B+KvEUPFXJwuv6Ft4A3lKuqsVPLz5kQCvze40ZIf8Bklnz7/LcYH058xT/F/lHsiP81/0P3M+/Z/gf2vzcfNf/A9wT+Sf0H/Rdcv9gPYi/S8MpNrDOx3F+Jae0iZfkdiDDjoV4dNkA//q9CscqPX6oQVv6S58LqsHxFwIKOwXOaJTWvpwAA/v7/Niq+Q0FGEqs7BlLuKuz5f/xiL71OXBTa5XwT7GUgkRoBQsMn6VfwRRIlbRCbsmEjQ7L7IjpWR9v//C5oeSintbo4Vg2fyUrrGnVsXHL2J/eZ8GvOLSBPoTwWA/VzX+N57/zZ6NmXTuau67M/Xvmi6F/ATQ+XR8PIPQoyo7otAE0/Hj8XGLZyHL63gHUyheq9FsBf/U0X+s7t/DEqG8MTRd9X/vuyb4IGf/yCWgWKAdP/62CL1Io/SVg5xan588Jf3qMeTE2tcVBvdAmtQaWP1ofpIcBVYLlG0sZV1S78EZ68efz9oY6khxVBCWe/co9zWNK1h8zAM4LjjQthsMJ/5Gomu+XhcVaELTNk8TU0Laz38vO7qV7DWj4d7/x3pLwkw58Aj+Cd3IlE6V9jLW749fq+X/TkmNVSPHS1My8h/t/6cBo9dCuXLtPYxtfv/G6b0QkvtCjqrhgNPipjsz8hjItQxrvk+zYMU5kgsZIXdiUoftukYdvMkDXS1CUL7OHHU1Rlyq8k66YINjOF0QDhtHXha3lg2vRYkeYKqS35xBmWOiPS48vA2wY+x8/Gn6flPNrNH9apLASJ+U75thUIivanEN53+wpfrv5nYoN7WJoF+ZnNYpsFf2FHMSR8gNpS6O5+wXxMLjNhqIFWrP6QOoZ8tPt47YyYN+OHBeLHXXIgTU1+Zvsf2fwHfEinJa+t91jxZJeNjd5WAXr/uw3P/nv8Em0Li06TDER6fD75PDZFoNOHy/MciHEyf9fuOA//IGOm36xaqEpHKLUXcXQmkBMn+s/6BakhnDH9vefyRkoz/LpJHOjth9CboS+IOXjUfX3ty+DV+58Lt+ele2K4VPRHebifb+ObQ2LWU5sueCF6WKUvZVjhKazW66YvMRtGIUnWr22gmk4aWwN26ULNgZCT329N5KGfOwij/Z0VFP2jyLe9oM6HF5X7mT+VvPB9FjsUF6/ngBRswbsaG1UduJv/bnzbwypKzvxlZG5d4/uZV3fzAD7Z2qpqOPhqCeRbfv4IDzideBw9l9h6sGTxky6o+ffIaiRXP0oBiyvxdB0nN0sUqCyT3GMp3FeAAAA="}}},"authorCollection":{"author":[{"title":"Gary Sockrider","uri":"/contributor/gary-sockrider","slug":"gary-sockrider","peopleAdvanced":{"firstName":"Gary","middleName":null,"lastName":"Sockrider"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTg0MjI=","title":"Top AI risks and fixes: Going beyond the Hype Cycle FUD","uri":"/perspective/three-imminent-risks-of-ai-and-what-the-industry-should-do-about-them","date":"2024-04-24T07:00:00","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/security-lock-AI.jpg","altText":"Three imminent risks of AI – and what the industry should do about them","caption":null,"title":"","mediaDetails":{"width":829,"height":553},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Mike Britton","uri":"/contributor/mike-britton","slug":"mike-britton","peopleAdvanced":{"firstName":"Mike ","middleName":null,"lastName":"Britton "}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTgxNzk=","title":"Navigating the ethical frontiers of our digital ecosystem","uri":"/perspective/navigating-the-ethical-frontiers-of-our-digital-society","date":"2024-04-23T07:00:00","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/042224_rainforest.jpg","altText":"Amazon Rainforest","caption":"\u003cp\u003eToday’s columnist, Callie Guenther of Critical Start, writes that the same way ecologists must protect the Amazon Rainforest from climate change, security pros have an obligation to keep all computer users safe. (Adobe Stock)\u003c/p\u003e\n","title":"Amazon Rainforest in Anavilhanas National Park, Amazonas – Brazi","mediaDetails":{"width":989,"height":659},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Callie Guenther","uri":"/contributor/callie-guenther-2","slug":"callie-guenther-2","peopleAdvanced":{"firstName":"Callie ","middleName":null,"lastName":"Guenther "}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTgyMTM=","title":"Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check","uri":"/perspective/bogged-down-by-siem-data-ingest-fees-3-strategies-to-keep-costs-in-check","date":"2024-04-22T17:11:45","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg","altText":"American cash banknotes money","caption":"\u003cp\u003e(Stillfx via Adobe Stock Images)\u003c/p\u003e\n","title":"American cash banknotes money","mediaDetails":{"width":1280,"height":800},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Kevin Paige","uri":"/contributor/kevin-paige-2","slug":"kevin-paige-2","peopleAdvanced":{"firstName":"Kevin","middleName":null,"lastName":"Paige"}}]}}]},"customTextColor":null,"customBackgroundColor":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_SimpleList","title":"In Brief","subtitle":null,"ctaLink":{"title":"More Briefs","url":"/brief"},"options":[],"collection":null,"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTkzNTE=","title":"AI sparks increasing cyber concerns for execs amid growing adoption","uri":"/brief/ai-sparks-increasing-cyber-concerns-for-execs-amid-growing-adoption","date":"2024-04-26T10:03:19","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/11/1127_artificial_intelligence.jpg","altText":"AI(Artificial intelligence) concept.","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"AI(Artificial intelligence) concept.","mediaDetails":{"width":1200,"height":800},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkzNDA=","title":"Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug","uri":"/brief/updated-cisa-exploited-vulnerabilties-catalog-includes-windows-print-spooler-bug","date":"2024-04-26T10:03:02","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/11/CISA-alert.jpg","altText":"CISA warns buggy Sophos, Oracle, Microsoft apps join Known Exploited Vulnerabilities list","caption":null,"title":"","mediaDetails":{"width":800,"height":533},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkzMzY=","title":"More details on rural water system breach sought by legislators","uri":"/brief/more-details-on-rural-water-system-breach-sought-by-legislators","date":"2024-04-26T09:45:28","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/041524_water_drop.jpg","altText":"Water drop","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"Water drop","mediaDetails":{"width":1123,"height":749},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkzMzE=","title":"Phishing attack compromises LA County Health Services data","uri":"/brief/phishing-attack-compromises-la-county-health-services-data","date":"2024-04-26T09:37:32","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/032824_phishing_email.jpg","altText":"Email and cyber security concept. Phishing, hacking, virus and account theft dangers.","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"Email and cyber security concept. Phishing, hacking, virus and a","mediaDetails":{"width":1200,"height":800},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkzMjg=","title":"Android device hijacking facilitated by new Brokewell banking trojan","uri":"/brief/android-device-hijacking-facilitated-by-new-brokewell-banking-trojan","date":"2024-04-26T09:34:16","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/09/0927_trojan_malware.jpg","altText":"Trojan malware","caption":"\u003cp\u003e(Adobe Stock Images)\u003c/p\u003e\n","title":"Antivirus found trojan malware thread","mediaDetails":{"width":1228,"height":816},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]}}]},"customTextColor":null,"customBackgroundColor":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_SimpleList","title":"More Resources","subtitle":null,"ctaLink":{"title":"MORE RESOURCES","url":"/resource"},"options":[],"collection":null,"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTY1NTA=","title":"Compromised backups send ransomware recovery costs soaring","uri":"/resource/compromised-backups-send-ransomware-recovery-costs-soaring","date":"2024-04-12T16:18:39","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/11/041723_ransomware3x2.png","altText":"","caption":null,"title":"041723_ransomware3x2","mediaDetails":{"width":1200,"height":800},"mediaAdvanced":{"lqip":"null"}}},"authorCollection":{"author":[{"title":"George V. Hulme","uri":"/contributor/george-v-hulme","slug":"george-v-hulme","peopleAdvanced":{"firstName":"George ","middleName":"V. ","lastName":"Hulme"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTQ3MTY=","title":"Cloud security: Challenges and best practices","uri":"/resource/cloud-security-challenges-and-best-practices","date":"2024-04-05T10:31:25","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/AdobeStock_529882524.jpg","altText":"","caption":null,"title":"cloud_AdobeStock_529882524","mediaDetails":{"width":800,"height":442},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Bill Brenner","uri":"/contributor/bill-brenner","slug":"bill-brenner","peopleAdvanced":{"firstName":"Bill","middleName":null,"lastName":"Brenner"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTQ2MDA=","title":"How cloud migration impacts modern network security","uri":"/resource/how-cloud-migration-impacts-modern-network-security","date":"2024-04-04T18:10:53","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg","altText":"","caption":"\u003cp\u003eCredit: Adobe Stock Images\u003c/p\u003e\n","title":"Neon cloud with locked padlock. Concept of data protection, security technology. AI","mediaDetails":{"width":2560,"height":1440},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Paul Wagenseil","uri":"/contributor/paul-wagenseil","slug":"paul-wagenseil","peopleAdvanced":{"firstName":"Paul","middleName":null,"lastName":"Wagenseil"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTM4MjU=","title":"How to evaluate and compare zero-trust platforms","uri":"/resource/how-to-evaluate-and-compare-zero-trust-platforms","date":"2024-04-02T05:32:31","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2022/08/RicardoJohnsonCol-e1661538118806.jpg","altText":"","caption":"\u003cp\u003eCredit: Getty Images\u003c/p\u003e\n","title":"Secure Computer Network. Zero Trust Security Model.","mediaDetails":{"width":1280,"height":608},"mediaAdvanced":{"lqip":"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"}}},"authorCollection":{"author":[{"title":"Paul Wagenseil","uri":"/contributor/paul-wagenseil","slug":"paul-wagenseil","peopleAdvanced":{"firstName":"Paul","middleName":null,"lastName":"Wagenseil"}}]}},{"__typename":"Editorial","id":"cG9zdDo3MTAyMDg=","title":"Foundational pillars of an effective zero-trust solution","uri":"/resource/foundational-pillars-of-an-effective-zero-trust-solution","date":"2024-04-01T08:09:15","editorialAdvanced":{"featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/parthenon-adobestock.jpg","altText":"The Parthenon in Athens, Greece, on a sunny day against a blue sky.","caption":"\u003cp\u003eThe Parthenon atop the Acropolis on a bright day in Athens, Greece. Credit: Tilialucida/Adobe Stock Images\u003c/p\u003e\n","title":"Parthenon on the Acropolis in Athens, Greece","mediaDetails":{"width":1000,"height":620},"mediaAdvanced":{"lqip":"UklGRsYFAABXRUJQVlA4ILoFAAAQHQCdASoyAB8APh0KhEGhBn1VBABxLYATplCOYfRPwl/JX5BKU/cvwBtCJHeUXSA21vmA/YD9gPeq9C/oAf2P/AdYB6AHll+xh+1/7he2BWC+RnvZ7IcYbk/zA+j/4X8ofUnvB9lORb+w/knlonzP+7/mBzAd5z+V/5n8l/RA8WjtX+we4B/EP5n/kvy3/onxKf339l84ny1/sv8T+630Afxz+Z/5X+8/ul/g///4Xf2S9iH9YFSh+k7+bQYvkQyK4ZXI/wRJhR7fd3NUJPm6E1T7urCKSwk9W0mNkGQu6m1dPfJLJ7sWqJg9yEc/x30gAP77t3oCthGgShsH684QwSBijIcDofPxUxRKOxh0DT6q7k4Ra0xTMuxh//ITx4AMZCVCYSV41sJwm9d1d+gYIuChn9bAufuqO+49E+6bFjuyfgoYmE4QUCHkWgNVwTqEjfvi6E+yAMIZ+sAiuOX//exF19NWb1UQo95U5YtsUsCz/+86Lx4MMc/a/kjH8JIbVK1yqAXPJgg6cbAfgs+EM1ypUjAtd2S/arSvotCMxX3A24DsL1ElGOEiGd8GPAzKjK7KGCfR5teuG8u/ezhdZWyYUt2Va6PE//YM2Esevwr16LkHI8WGSYv83fWJ5yY/+12tvOzciMO7WsAvy5ZGSLBcVHaF6P1EdI1TaAsBr7Cf3dEIUhNHO/jCJFSrfe6qAVJZAlEqUqTgeF/bJcDQ7cfSx/C4e4nAtATacoTwLTcRXgH3GmdjJUukD0lFnQ6A8+pm6SQRgFftVo7gcttSLfGtwfN0Gm2wh/cHKqJkt806+D8gVLTrgSFPiUDrzAKsBRj2TQgpMLdVKw6Jp+xD/tD7xNNXu0wnyHtdn/5Up5kBFt1RKhcgy45qQa+OOFPVmT7ylHxvacJWd5/DPWo9VzCu1OiGQmFFF08Sbl+uist7hXGwR2bGbVIpI5jP8PEqkU6PN6G4+B0RzCs1O1vlxcvOQcKGYHPTnXs4QqhO0f0KJ508i4X8KNkT6AG7QtgT8xcqyD/xDRQtr7CADWdo98jUHM92dUQnRe1qHkfgB6uTQRUjZd27Z0uRicK8SgwgDmUBK8UcmP+Geyj27X5kYJzSpvQZ7v5bb+PoAzkrCN8Ny6KPrebmNNz3FYSm6U2r/eqrnTvjooKSmoCRumvZFFNixv4+ZlNGyP6PT9zmLQzdzxdCHW6auIKiIzec5m1ymTxGNwDQjFDtlqDYtpHlKbVYhnJ0zQFGujkl55//tw97JziRYI3jj03gWtLRHM+Nb2v5Vhf3UxvedKP+WsIuDSIkj7T3LtfZYrGtm0BWhyB5XOjeH2iR24dj0q6cjzJf84QQavVfAfzxe464Lsj79kz+Z60P2jGlzQ6tQI9rhxeVVlbx7kxmH8x6+wm7uwMfnT/RJCbTmW3SjXUL/iPf/1KjlZMg1R6ME89R5r50RKn+//4yr3yRIYsIsqcg3Li0ahtaadcyu2aZbCFq7enGikRZVhwp1oOLvkPuDTTp3n+X5OOyMyTUuj/09XHXWEAMvfUvurkyRYz9COWlMT2WsHPWLDSOgp+KB8ePXRDnI5+hA99VnyD6lO6+bucAEYI12IqGuZikhAFIBVaM3vvSxfYqKKjz/a3ohShpKdd6EtmFW9aMGLxCjrdmFE3xGQc0yUQnMA4Xn9vdVsNXie7u/ofQPJvWknRX3/v6r9wGddmXlffDHTb9vAtt3xzdkO7CguU7RWgpTgyKfuvku+3sXzMX8fjj5CUqeWP1ofkUztDgZ+6aVUOZH5adkityJf2YElbGfXX9dzzy1mm/0Vh2MU2z6t4g7CfT9c4MvTfE6W+bjFpDSA4lGBio+0hwHj8CvRSwinkEAGPkW8wExo0V5Qa6TYSC2DZP0oNUEtS9YWJlvwbKFxX+F6LWHhn9V7a/eooIa0OeA4ZOeAQ09wiUpRHeF/hoKcAAAA=="}}},"authorCollection":{"author":[{"title":"Paul Wagenseil","uri":"/contributor/paul-wagenseil","slug":"paul-wagenseil","peopleAdvanced":{"firstName":"Paul","middleName":null,"lastName":"Wagenseil"}}]}}]},"customTextColor":null,"customBackgroundColor":null}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}},{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_ListWithImage","nativeAdTopics":[],"numberOfItems":10,"hideImages":null,"hasFeaturedItem":null,"postType":["editorial","ppworks_segment"],"hasNativeAds":true,"fetchedPostsList":[717889,704544,719418,716532,717216,717007,703606,704543,707678,704076,704075,708986,719204,718944,718422,718179,719351,719340,719336,719331,719328,716550,714716,713825,710208,713690,714241,713699,716907,716505],"nativeAdFrequency":4,"taxonomyQuery":{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_ListWithImage_TaxonomyQuery","relation":"AND","queryArray":[{"terms":[{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72158,"slug":"analysis"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72159,"slug":"feature"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72162,"slug":"research-article"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72163,"slug":"product-test"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72157,"slug":"news"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72438,"slug":"video"}],"operator":"IN"},{"terms":[{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72164,"slug":"brief"},{"__typename":"EditorialType","taxonomyName":"editorial_type","databaseId":72165,"slug":"native"},{"__typename":"ScAward","taxonomyName":"sc_award","databaseId":74393,"slug":"sc-awards-2023"}],"operator":"NOT IN"}]},"resolvedPostCollection":{"nodes":[{"__typename":"Editorial","id":"cG9zdDo3MTc4NjI=","databaseId":717862,"uri":"/resource/active-adversary-report-ransomware-hit-a-ceiling-but-security-teams-at-risk-for-more-pain","title":"Active adversary report: Ransomware hit a ceiling, but security teams at risk for more pain","date":"2024-04-19T14:23:15","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"George V. Hulme","uri":"/contributor/george-v-hulme","slug":"george-v-hulme","peopleAdvanced":{"firstName":"George ","middleName":"V. ","lastName":"Hulme"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eDespite a pause in the rise of ransomware, organizations are failing to take the steps necessary to adequately defend themselves against the increase in attacks to come.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/08/map-cyberattacks-globe-GettyImages-1199826393.jpg","altText":"","caption":"\u003cp\u003eCredit: Getty Images\u003c/p\u003e\n","title":"","mediaDetails":{"width":1024,"height":294},"mediaAdvanced":{"lqip":"UklGRhYBAABXRUJQVlA4IAoBAADQBgCdASoyAA4APpU4mEgloyKhMBgMALASiUATpll3/6RMczRrck7bBVcBehbIou3k+Rzjo6ngfVxXyvlBHwAA/v3bNgGtHSPV3G9VOz50c30xjZiwlmaq9wMkjTffXexBKQPKseY9AzbajeZxG1zKbN0kY/sjgiQDfNL4ypPqID9ILeG8WduKh6s2833sCdvGzkxPo54YbfHwr7juEfTSq+Jc/SifTO23HLOfZPuaUXcBu64ier6iP4JARCV8CFM3yB0VyyP4qcX7PpH8OOUWnC0o9V+zQ4vE7xYIYQEMWD60sy89wzMSKp03OiVvV3rvYDRQHtnYzssBamrI7eJj+l5/UPTZT8AAAA=="}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Resource"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/ransomware","name":"Ransomware","slug":"ransomware","id":"dGVybTo3NDYwMQ==","uri":"/topic/ransomware"}]}},{"__typename":"Editorial","id":"cG9zdDo3MTgyMTM=","databaseId":718213,"uri":"/perspective/bogged-down-by-siem-data-ingest-fees-3-strategies-to-keep-costs-in-check","title":"Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check","date":"2024-04-22T17:11:45","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU5MQ==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}}]},"authorCollection":{"author":[{"title":"Kevin Paige","uri":"/contributor/kevin-paige-2","slug":"kevin-paige-2","peopleAdvanced":{"firstName":"Kevin","middleName":null,"lastName":"Paige"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eSolutions exist that let organizations adjust the volume of data being processed by their SIEM system.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/03/030323_cash_money.jpg","altText":"American cash banknotes money","caption":"\u003cp\u003e(Stillfx via Adobe Stock Images)\u003c/p\u003e\n","title":"American cash banknotes money","mediaDetails":{"width":1280,"height":800},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Perspective"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/governance-risk-and-compliance","name":"Governance, Risk and Compliance","slug":"governance-risk-and-compliance","id":"dGVybTo3NDU5MA==","uri":"/topic/governance-risk-and-compliance"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/compliance-management","name":"Compliance Management","slug":"compliance-management","id":"dGVybTo3NDU5MQ==","uri":"/topic/compliance-management"}]}},{"__typename":"Editorial","id":"cG9zdDo3MTQ2MDA=","databaseId":714600,"uri":"/resource/how-cloud-migration-impacts-modern-network-security","title":"How cloud migration impacts modern network security","date":"2024-04-04T18:10:53","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDY0Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mg==","children":{"nodes":[{"id":"dGVybTo3NDU4Nw=="},{"id":"dGVybTo3NDU4OA=="},{"id":"dGVybTo3NDY1MA=="},{"id":"dGVybTo3NDU4OQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Paul Wagenseil","uri":"/contributor/paul-wagenseil","slug":"paul-wagenseil","peopleAdvanced":{"firstName":"Paul","middleName":null,"lastName":"Wagenseil"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eCloud computing improves scalability and may cut costs, but network-security practitioners may have difficulty adjusting. Here are some challenges and solutions of cloud-based network security.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/Cloud-Security_AdobeStockImages_cropped-scaled.jpg","altText":"","caption":"\u003cp\u003eCredit: Adobe Stock Images\u003c/p\u003e\n","title":"Neon cloud with locked padlock. Concept of data protection, security technology. AI","mediaDetails":{"width":2560,"height":1440},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":"Credit: Adobe Stock Images"},"editorialTaxonomy":{"type":{"name":"Resource"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/network-security","name":"Network Security","slug":"network-security","id":"dGVybTo3NDU4Mg==","uri":"/topic/network-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/cloud-security","name":"Cloud Security","slug":"cloud-security","id":"dGVybTo3NDU3OQ==","uri":"/topic/cloud-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/cloud-migration","name":"Cloud migration","slug":"cloud-migration","id":"dGVybTo3NDY0Mg==","uri":"/topic/cloud-migration"}]}},{"__typename":"CerberusDfpNativeAd","id":"44969d21c904b1e25640975eba6c3cc96989d402","databaseId":32524362},{"__typename":"Editorial","id":"cG9zdDo3MTk0NzY=","databaseId":719476,"uri":"/news/cybersecurity-firm-darktrace-sold-to-thoma-bravo-for-5-3-billion","title":"Cybersecurity firm Darktrace sold to Thoma Bravo for $5.3 billion","date":"2024-04-26T17:03:41","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYxMQ==","children":{"nodes":[{"id":"dGVybTo3NDYzNw=="},{"id":"dGVybTo3NDYzOA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mg==","children":{"nodes":[{"id":"dGVybTo3NDU4Nw=="},{"id":"dGVybTo3NDU4OA=="},{"id":"dGVybTo3NDY1MA=="},{"id":"dGVybTo3NDU4OQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Stephen Weigand","uri":"/contributor/stephen-weigand","slug":"stephen-weigand","peopleAdvanced":{"firstName":"Stephen","middleName":null,"lastName":"Weigand"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eThe acquisition comes a day after another cybersecurity firm, Rukrik, went public.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/05/0508_cash_money.jpg","altText":"money background","caption":"\u003cp\u003e(Adobe Stock Images)\u003c/p\u003e\n","title":"money background","mediaDetails":{"width":1280,"height":800},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/aiml","name":"AI/ML","slug":"aiml","id":"dGVybTo3NDYxMQ==","uri":"/topic/aiml"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/network-security","name":"Network Security","slug":"network-security","id":"dGVybTo3NDU4Mg==","uri":"/topic/network-security"}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkzNjg=","databaseId":719368,"uri":"/news/kaiser-permanente-notifies-134m-patients-of-potential-data-exposure","title":"Kaiser Permanente notifies 13.4M patients of potential data exposure","date":"2024-04-26T14:17:31","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","children":{"nodes":[{"id":"dGVybTo3NDY0Nw=="},{"id":"dGVybTo3NDY0OA=="},{"id":"dGVybTo3NDYwNQ=="},{"id":"dGVybTo3NDU5Nw=="},{"id":"dGVybTo3NDY0OQ=="},{"id":"dGVybTo3NDY0Ng=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Nw==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Steve Zurier","uri":"/contributor/steve-zurier","slug":"steve-zurier","peopleAdvanced":{"firstName":"Steve","middleName":null,"lastName":"Zurier"}}]},"editorialAdvanced":{"deck":"\u003cp\u003ePatient data may have been transferred via apps to third-party vendors like Google, Microsoft and X.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/0426_kaiser_permanente.jpg","altText":"Kaiser Permanente medical care facility.","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"Kaiser Permanente Medical Care Building","mediaDetails":{"width":1094,"height":730},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/identity","name":"Identity","slug":"identity","id":"dGVybTo3NDU5Ng==","uri":"/topic/identity"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/privacy","name":"Privacy","slug":"privacy","id":"dGVybTo3NDU5Nw==","uri":"/topic/privacy"}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkyNTE=","databaseId":719251,"uri":"/news/rubrik-ipo-signals-potential-cybersecurity-led-tech-market-revival","title":"Rubrik IPO signals potential cybersecurity-led tech market revival","date":"2024-04-25T18:05:27","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Laura French","uri":"/contributor/laura-french","slug":"laura-french","peopleAdvanced":{"firstName":"Laura","middleName":null,"lastName":"French"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eMarket experts say a resurgence of successful cybersecurity IPOs is likely on the way.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/04/AdobeStock_788759661_Editorial_Use_Only.jpg","altText":"","caption":"\u003cp\u003e(Credit: Rafael Henrique \u0026#8211; stock.adobe.com)\u003c/p\u003e\n","title":"AdobeStock_788759661_Editorial_Use_Only","mediaDetails":{"width":800,"height":533},"mediaAdvanced":{"lqip":"UklGRigEAABXRUJQVlA4IBwEAADQEwCdASoyACEAPo02lkglIyIhMA6ooBGJbACxHuN8rIYqn9q3jsnfaNOW8rToU/sr6gPsA917/K+rrzgP5n1hnok9K3/ea/L+5+DPgl9KHz0UG1PvBmROJXSgzPPGJ9W+wR+tnpY+xX0bhN8jpvKPC77MKiq4WEfTq4IOc//HZdRJwvYBgB/JxPdo8aEwWa+DLEBgt+mfM5+CtVWoRm+zLmt6yBSY0AD+0IOshWO1meytyrCzhP9ZvBnxFYhdhbHfSJJt/bLzwOOtlQT6nOj6/YK0cH/ydwBxetqjSswG1AMg31frMUMy2km37FM9YshAeTeO4iOdqt+QJmo///GR/SFHrx6yxOkEjVLi//NKYo/mwct0e+mSJr+JpOV7Fpmkr2fZ4HgX8+HdrvdpiyNLq+DCXXd921V5JBfD/UFZnDs8xGp740d8dEiOTU3gDOInqQi9KcZVGWOmdV0nqRi4FNC/3u3Li/+I4NfYsRrP9TfSmiRS6BKnmw+Fbd7eTLU7iikoDVhJ+AZTMlsx+Coilx7j4WuQpxXjMjG87ZBoe6JRKt+Yx2/CSbOnL5KExDzDR2v2GRSdZnzpz8wDI7pH/zAyb/HqS6ZLAG6H/fjfGlXgfhxwDDeNb3ByN/2VQRf91tD95z1GPsosF3tBbcTuRA3ckMuTJJADKJbcHHjKtZ+w2lB5DMooA1Pzk/MBLVCn7DmnuVymTJBJ3ayKkEex879S9jxnhSpcWnX2TnEfgu/srWBjHCYGMcJbJF/ikdrWc5vgjYhe4v8gCuStOHbeJ/9Ws0ma0xcPs0laIHPH2uQUU1zzABv+FjXC0D94Z454CvU8oZMwpWdU+ClCLXbjGcti0Pki/Hz/VL/2+Ft/A28FNUIaS0nhNE9k2B2NSfYIfKfqmzEawF1elPkK162kr1cd7QMJcLS+pB900UjilMUjp+757YtfrUmGs9+G4XVSOngp3zzcMHPZ1ou/NkkIhKr5/MFpSAMe/kazUVV3Us0vqO1VghZz1kNnZ+HLyYMMrhCxs3JfwY+3DLaMbEh3vjmTy7DQvNwN2JX/Xy1FOo1MAdg0hds0tmD/OoHMhNcmu8hRwc2hk0T4vrnQBGI/vkKNUid3PFq7fA3S1GXSFi/8FP6vYwdvhhkHt7+mmteyq7yh1bnLJOhBbaBrRhqzzVBRaxnXIKRFBCdh2FRdFxHiMeHlO1ZXgjZV4vQI+gHWPEz7HCgThficxqT95AOsCmKm3xINK4eJvNqlG9Iyw8LwIDB8u/rSNm+ue7It88y1kUW4Mm8uQ2Ot+WgQnonmgCwwFJwQEnVgpoe3Uebu0RZuo83fIGTKWteASlT/g2OfcVjRIPFlrnhlq+n+eGUm7uYkzqG2VfyInzWgcu8m4RPaHPv7nOcAAAAAAA=="}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/cloud-security","name":"Cloud Security","slug":"cloud-security","id":"dGVybTo3NDU3OQ==","uri":"/topic/cloud-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"}]}},{"__typename":"CerberusDfpNativeAd","id":"f8187c344067dbccf5cb5ce1c7fc2c6afb3b4216","databaseId":11556596},{"__typename":"Editorial","id":"cG9zdDo3MTkxNjg=","databaseId":719168,"uri":"/news/after-a-19-month-saga-broadcom-finally-patches-brocade-sannav-bugs","title":"After a 19-month saga, Broadcom finally patches Brocade SANnav bugs","date":"2024-04-25T15:59:50","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU3NQ==","children":{"nodes":[{"id":"dGVybTo3NDU3Ng=="},{"id":"dGVybTo3NDU4Ng=="},{"id":"dGVybTo3NDYzOQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyNA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Nw==","children":{"nodes":[{"id":"dGVybTo3NDYyMw=="},{"id":"dGVybTo3NDYyNA=="},{"id":"dGVybTo3NDYwMw=="},{"id":"dGVybTo3NDU3OA=="}]}}]},"authorCollection":{"author":[{"title":"Steve Zurier","uri":"/contributor/steve-zurier","slug":"steve-zurier","peopleAdvanced":{"firstName":"Steve","middleName":null,"lastName":"Zurier"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eSecurity pros say given the complexity of SAN management tools, it’s understandable the patches took so long.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/030524_patch.jpg","altText":"patch presented in the form of binary code","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"patch presented in the form of binary code","mediaDetails":{"width":900,"height":600},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/application-security","name":"Application security","slug":"application-security","id":"dGVybTo3NDU3NQ==","uri":"/topic/application-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/vulnerability-management","name":"Vulnerability Management","slug":"vulnerability-management","id":"dGVybTo3NDU3Nw==","uri":"/topic/vulnerability-management"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/patchconfiguration-management","name":"Patch/Configuration Management","slug":"patchconfiguration-management","id":"dGVybTo3NDYyNA==","uri":"/topic/patchconfiguration-management"}]}},{"__typename":"Editorial","id":"cG9zdDo3MTkxMTA=","databaseId":719110,"uri":"/news/cisco-firewalls-targeted-in-sophisticated-nation-state-espionage-hack","title":"Cisco firewalls targeted in sophisticated nation-state espionage hack","date":"2024-04-25T11:14:36","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NTEyNQ==","children":{"nodes":[{"id":"dGVybTo3NTEyNg=="},{"id":"dGVybTo3NTEyNw=="},{"id":"dGVybTo3NTEyOA=="},{"id":"dGVybTo3NTEyOQ=="},{"id":"dGVybTo3NDU4MA=="},{"id":"dGVybTo3NTEzMA=="},{"id":"dGVybTo3NTEzMQ=="},{"id":"dGVybTo3NTEzMg=="},{"id":"dGVybTo3NTEzMw=="},{"id":"dGVybTo3NTEzNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4MA==","children":{"nodes":[{"id":"dGVybTo3NDY0NQ=="},{"id":"dGVybTo3NDYwOQ=="},{"id":"dGVybTo3NDU4MQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4MQ==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mg==","children":{"nodes":[{"id":"dGVybTo3NDU4Nw=="},{"id":"dGVybTo3NDU4OA=="},{"id":"dGVybTo3NDY1MA=="},{"id":"dGVybTo3NDU4OQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyMA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYxOQ==","children":{"nodes":[{"id":"dGVybTo3NDY1Mw=="},{"id":"dGVybTo3NDY1NA=="},{"id":"dGVybTo3NDYyMQ=="},{"id":"dGVybTo3NDYyMg=="},{"id":"dGVybTo3NDYyMA=="},{"id":"dGVybTo3NDY1NQ=="}]}}]},"authorCollection":{"author":[{"title":"Simon Hendery","uri":"/contributor/simon-hendery","slug":"simon-hendery","peopleAdvanced":{"firstName":"Simon","middleName":null,"lastName":"Hendery"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eSecurity agencies sound alarm over campaign aimed at Cisco’s Adaptive Security Appliance software.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2023/10/1006_cisco.jpg","altText":"A sign with the Cisco logo is seen outside of a building","caption":"\u003cp\u003e(Adobe Stock Images)\u003c/p\u003e\n","title":"CISCO sign in front of the headquarters in Silicon Valley","mediaDetails":{"width":1449,"height":966},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/network-security","name":"Network Security","slug":"network-security","id":"dGVybTo3NDU4Mg==","uri":"/topic/network-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/endpointdevice-security","name":"Endpoint/Device Security","slug":"endpointdevice-security","id":"dGVybTo3NDU4MQ==","uri":"/topic/endpointdevice-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/threat-intelligence","name":"Threat Intelligence","slug":"threat-intelligence","id":"dGVybTo3NDYyMA==","uri":"/topic/threat-intelligence"}]}}]},"options":["nativeAds","pagination"],"title":null,"paginationType":"button","customBackgroundColor":null,"customTextColor":null}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}},{"blocks":[{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_FeaturedImage","link":{"title":"","url":"/sc-awards-2024-about"},"template":"default","featuredImageOptions":{"height":null,"width":null,"position":"auto"},"image":{"sourceUrl":"https://files.scmagazine.com/wp-content/uploads/2024/03/SC-Awards_March-26.png","altText":"","caption":null,"title":"SC-Awards_March 26","mediaDetails":{"width":2000,"height":1125},"mediaAdvanced":{"lqip":"null"}},"customTextColor":null,"customBackgroundColor":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_SimpleList","title":"EVENTS","subtitle":null,"ctaLink":null,"options":["upcomingEvents"],"collection":null,"resolvedPostCollection":{"nodes":[{"__typename":"Learning","id":"cG9zdDo3MTM2OTA=","title":"A CISOs Guide to Data Governance at the Dawn of AI","uri":"/cybercast/a-cisos-guide-to-data-governance-at-the-dawn-of-ai","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Thursday, May 9, 2024 | 02:00 PM America/New_York","endDate":"Thursday, May 9, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}},{"__typename":"Learning","id":"cG9zdDo3MTQyNDE=","title":"AI and AppSec: How to avoid insecure AI-generated code","uri":"/cybercast/ai-and-appsec-how-to-avoid-insecure-ai-generated-code","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Tuesday, May 14, 2024 | 02:00 PM America/New_York","endDate":"Tuesday, May 14, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}},{"__typename":"Learning","id":"cG9zdDo3MTM2OTk=","title":"4 key takeaways from new global AI security guidelines","uri":"/cybercast/4-key-takeaways-from-new-global-ai-security-guidelines","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Wednesday, May 15, 2024 | 12:00 PM America/New_York","endDate":"Wednesday, May 15, 2024 | 01:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}},{"__typename":"Learning","id":"cG9zdDo3MTY5MDc=","title":"Exposure management: How organizations can use it to build cyber resilience","uri":"/cybercast/exposure-management-how-organizations-can-use-it-to-build-cyber-resilience","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Wednesday, May 15, 2024 | 02:00 PM America/New_York","endDate":"Wednesday, May 15, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}},{"__typename":"Learning","id":"cG9zdDo3MTY1MDU=","title":"Uncovering a year of phishing data: latest trends and tactics","uri":"/cybercast/uncovering-a-year-of-phishing-data-latest-trends-and-tactics","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Thursday, May 23, 2024 | 12:00 PM America/New_York","endDate":"Thursday, May 23, 2024 | 01:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}]},"customTextColor":null,"customBackgroundColor":null},{"__typename":"Landing_Collectionwidget_layouts_columns_Blocks_Ad","name":"box","disableRotation":null,"targetingOptions":{"sid":null}}],"colorSettings":{"customBackgroundColor":null,"customTextColor":null}}]}],"className":[],"landingTaxonomy":{"topic":[]},"sponsored":false,"fetchedPostsList":[717889,704544,719418,717862,716532,717216,717007,703606,704543,707678,704076,704075,708986,719204,718944,718422,718179,718213,719351,719340,719336,719331,719328,716550,714716,714600,713825,710208,717862,718213,714600,719476,719368,719251,719168,719110,713690,714241,713699,716907,716505],"pageSlug":"homepage","meta":{"authors":[],"breadcrumb":[{"name":"SC Media","position":0,"item":"https://www.scmagazine.com/"},{"name":"Cybersecurity News, Awards, Webinars, eSummits, Research","position":1,"item":"https://www.scmagazine.com/homepage"}],"created":"2024-03-26T08:45:00.000America/New_York","modified":"2024-04-26T15:44:00.000America/New_York","authorNames":[],"subtypeSlug":null,"images":null,"uri":"homepage","title":"Cybersecurity News, Awards, Webinars, eSummits, Research","databaseId":"125983","description":"The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market.","openGraphType":"collection","contentType":"landing","sponsor":null,"taxonomy":{"topic":[],"scAwards":[]},"category":null,"jsonLdImages":[],"url":"https://www.scmagazine.com/homepage","openGraph":{"url":"https://www.scmagazine.com/homepage","title":"Cybersecurity News, Awards, Webinars, eSummits, Research","description":"The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market.","locale":"en_US","type":"collection","article":{"publishedTime":"2024-03-26T08:45:00.000America/New_York","modifiedTime":"2024-04-26T15:44:00.000America/New_York","authors":[],"tags":[]},"images":[{"url":"https://www.scmagazine.com/images/fallback-image.png"}]}},"isPreview":false},"__N_SSG":true},"page":"/","query":{},"buildId":"mk0iT6z4ErbL2Bo9AFMKb","isFallback":false,"isExperimentalCompile":false,"dynamicIds":[49036,92297,78812],"gsp":true,"scriptLoader":[]}</script></body></html>
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda