jamesdull Profile Banner
james dull Profile
james dull

@jamesdull

Followers
499
Following
294
Media
254
Statuses
3K

family man, likes sports, works in technology field, enjoys music and food

Ohio
Joined March 2009
Don't wanna be here? Send us removal request.
@jamesdull
james dull
4 years
While the cloud delivers an astonishing array of resources, it requires skill to perfect. A key element in cloud success involves finding people with the right skills and expertise.
techtarget.com
Take a closer look at a modern cloud team structure, as well as most important roles and responsibilities.
0
0
7
@jamesdull
james dull
4 years
Developing cyber risk metrics offers a starting point for private sector companies who want to raise cyber risk to their boards of directors and improve decision making.
0
0
0
@jamesdull
james dull
4 years
“While we have infinite capacity within the cloud, no one has infinite money to spend on their new workload environment.” Read @vrajaji thoughts on how CIOs should be managing their shift to the cloud in @InformationWeek
Tweet media one
0
0
0
@jamesdull
james dull
4 years
So proud! @Quest was invited to present at the @NISTcyber #ransomware prevention and recovery workshop on July 14th. Join us to learn why having a dedicated identity recovery plan and recovering directory services are both so critical. #nccoe
Tweet media one
0
0
0
@jamesdull
james dull
4 years
Microsoft is essentially taking over AT&T’s cloud network deployment, responsible for operations as it exists today and transforming it with a combination of hybrid cloud assets.
0
0
0
@jamesdull
james dull
4 years
CISOs and security leaders can avoid huge losses by preparing for ransomware attacks before they happen.
Tweet card summary image
gartner.com
Gartner analyst Paul Webber shares 6 actions #CISO can take to defend against #ransomware attacks. Learn more. #Cybersecurity #CISO #GartnerSYM @Gartner_IT
0
0
0
@jamesdull
james dull
4 years
We’ve recently seen several large orgs hand over millions in crypto to ransomware gangs, but does that mean follow-up attacks are less likely to occur? Not according to a new report that reveals almost half of all victims are targeted by the same hackers.
Tweet card summary image
techspot.com
In a study by Censuswide (via ZDNet), it was discovered that around 80% of organizations who paid ransoms were hit by a second attack, 46% of which...
0
0
0
@jamesdull
james dull
4 years
We are excited to share @cyberdefensemag recognized One Identity's identity & access management solutions in this year's Global InfoSec Awards!
Tweet media one
0
0
0
@jamesdull
james dull
4 years
Colonial Oil first, then JSP, and many more. #ActiveDirectory is a prime target for Impact Attacks. We have a great webinar coming up that you won't want to miss showing you how to improve prevention, damage control and fast recovery.
Tweet media one
0
1
0
@jamesdull
james dull
4 years
Cybercrime has been steadily rising for years, both in frequency and sophistication. But there’s something about 2020/21 that should make us sit up and pay attention. #CyberSecurity
Tweet media one
0
0
0
@jamesdull
james dull
4 years
Brief internet service outages are not uncommon but with all the recent news of #ransomware attacks it is often enough to scare the markets making it vital you keep your company safe.
0
0
0
@jamesdull
james dull
4 years
Cisco Internet of Things (IoT) Control Center was facing challenges keeping their data replicated among multiple data centers. See how the problem was solved. #datacentermanagement
Tweet media one
0
0
0
@jamesdull
james dull
4 years
And another one. Martha's Vineyard ferry disrupted by ransomware attack - CNN #ransomware #Security #Cyberattack.
0
1
0
@jamesdull
james dull
4 years
When you’re looking for a definition of data democratization, you find a few common threads.
0
0
0
@jamesdull
james dull
4 years
First the oil, now the food chain! It's CRITICAL for companies to be prepared. Is yours? #CyberSecurity.
0
1
0
@jamesdull
james dull
4 years
Very exciting announcement! Core PAM, IGA and Active Directory security solutions are now all available in SaaS models and ISO 27001 certified.
Tweet card summary image
itsecurityguru.org
One Identity has announced the availability of its Active Roles and Password Manager products in a software-as-a-service (SaaS) delivery model. The company also
0
0
0
@jamesdull
james dull
4 years
To select a suitable #datamanagement solution for your business, you need to think about a variety of factors. Several industry professionals shared their insight on the topic.
Tweet card summary image
helpnetsecurity.com
To select a suitable data management solution for your business, you need to think about many factors. Infosec leaders offer advice.
0
0
0
@jamesdull
james dull
4 years
The amount paid out increased more than 300%. Great article with some tips on making sure you and your company are prepared. #ransomware 
hbr.org
These are unprecedented times in the world of cybersecurity, with ransomware attacks up 150% in 2020 and growing even faster in 2021. Most audit committees and senior management who have to make...
0
0
0
@jamesdull
james dull
4 years
Intel just took a significant step toward making quantum computing more practical.
0
0
0
@jamesdull
james dull
5 years
Live Webinar: Secure your Data from Ransomware. | December 9th, via @Quest.
0
0
1