Remove 2010 Remove Authorization Remove Vulnerability
article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

This way the reader is given a roadmap to pick and choose from, if they wish so, the case studies written by various authors whose chapters span a wide variety of hazards as well as geographical and sociological settings all of which delve into a chosen aspect of disaster recovery towards building resiliency.

article thumbnail

A beginner’s guide to implementing zero-trust architecture

Online Computers

The term “zero trust” was popularized by John Kindervag of Forrester Research in 2010 when he described the concept of security as “Never trust, always verify.” According to him, trust is a security vulnerability and verification is a security necessity. What is zero-trust architecture?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Opinion: Why It’s Time to Get Serious About the Risk of Commercial Drones

Security Industry Association

Since its 2010 inception, the commercial drone market is estimated to grow to an $11 billion enterprise by 2031. Public space is more vulnerable to a myriad of threats posed by commercial drones. Venues that support large public gatherings tend to be unprepared for a drone event and have even less authority to do something proactive.

article thumbnail

Securing Mass Gathering Events: A Simple Design Framework That Considers the Air Domain

Security Industry Association

He is also the author and provider of a series of online training courses. Like security program development, planning for an event is a “team sport” that begins with the foundational work of a threat, vulnerability and risk assessment (TVRA) and ends with internal and external stakeholder rehearsals and exercises. He is a retired U.S.

article thumbnail

VMware vs. OpenStack: Choosing the Right Cloud Management Solution

Pure Storage

History and Development OpenStack was founded in 2010 as a joint project between NASA and Rackspace Technology. Identity management: Keystone is OpenStack’s identity service, which handles authentication, authorization, and service discovery.