In the last couple of years, events were taken online, moved to virtual forums and conducted using social platforms via video set-up. Events became simpler to attend, but the individual component of the experience was missing – we all wanted to mix wit…
Tag: Industry Insights
Global Security News
Cyber-Physical Security: Benchmarking to Advance Your Journey
by Galina Antova •
Operational resilience is a priority and organizations are decisive about protecting cyber-physical systems (CPS) in today’s consolidated and converged reality
read more
Global Security News
Security Orchestration: Beware of the Hidden Financial Costs
by Marc Solomon •
Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the inclusion of security automation and orchestration capabilities in solution categories beyond SOAR platforms….
Global Security News
Hybrid Networks Require an Integrated On-prem and Cloud Security Strategy
by John Maddison •
Today’s dynamic networks change so fast that traditional point security solutions fail to keep up
read more
Global Security News
Lessons for Better Fraud Decision-Making
by Joshua Goldfarb •
Have you ever stopped to think about how you go about deciding whether to try a new restaurant that you’ve never been to? Even if you don’t realize what you are doing, when you make this decision, you are likely collecting data around a number of diffe…
Global Security News
Malware’s Destruction Trajectory and How to Defeat It
by Derek Manky •
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence. And just to add insult to injury, there are more of them. Today’s attacks a…
Europe, Global Security News, North America
BWAA-ck to Basics: Insights from the 2022 Verizon DBIR on Basic Web Application Attacks
by Benjamin Gowan •
The Verizon Data Breach Investigations Report (DBIR) is a treasure trove of data and a true gift to the cyber risk quantification community. From CISOs learning key trends, to analysts estimating breach frequencies in an industry, the DBIR has su…
Global Security News
Facilitating Convergence of Physical Security and Cyber Security With Open Source Intelligence
by Landon Winkelvoss •
The desire to merge aspects of physical and cyber security is nothing new, especially in maturing enterprises that are proactively extending their security capabilities. Since many aspects of physical security are connected to the internet, enterprises…
Global Security News
4 Ways to Close the OT Cybersecurity Talent Gap
by Galina Antova •
We have a great challenge with the gap in cybersecurity jobs in general, with estimates ranging from 2.72 million to 3.5 million job openings in 2021.
read more
Global Security News
Digital Experience Monitoring: More Important Than Ever
by Torsten George •
With the shift to work-from-anywhere, many organizations have seen an increase in scale of remote work locations that their IT team must support. At the same time, users expect consistent and good quality experiences no matter where they are. Ultimatel…
Global Security News
Automation. Where do We Go from Here?
by Marc Solomon •
What’s next in the evolution of security automation and orchestration?
read more
Global Security News
Tapping Neurodiverse Candidates Can Address Cybersecurity Skills Shortage
by Jeff Orloff •
While neurodiverse candidates don’t fit the traditional mold of applicants, they can often excel at highly focused, analytical work
read more
Global Security News
Learn to Use This First: Four Fundamental Tactics to Protect Email Ecosystems
by Keith Ibarguen •
There is a great line in the movie Braveheart where Uncle Argyle says to young William, “First, learn to use this, then I’ll teach you to use this.” He is of course talking about William’s mind over his sword, but it is a prophetic statement when appli…
Global Security News
Defending the Healthcare Security Landscape in the Age of Connected Devices
by Marie Hattar •
Articles focused on cybersecurity threats facing the connected medical device market often cite a well-worn statistic: the average hospital bed in the United States has 10 to 15 internet-enabled devices that collect and transmit data.
read more
Global Security News
Prepare for What You Wish For: More CISOs on Boards
by Marc Solomon •
We have a long way to go to get adequate cybersecurity expertise on boards, but the time has come to make it happen
read more
Global Security News
The Importance of Wellness for Security Teams
by Joshua Goldfarb •
With the talent shortage in security, employers need to use a variety of tools to recruit and retain top talent
read more
Europe, Global Security News, North America
SecZetta Included in 2022 Gartner Market Guide for Insider Risk Management Solutions
by SecZetta •
SecZetta, the leading provider of third-party identity risk solutions, today announced it was included in the Gartner 2022 Market Guide for Insider Risk Management Solutions. According to Gartner, organizational dependence …
The post SecZetta Include…
Global Security News
7 Steps to Start Reducing Risk to Your Critical Infrastructure Quickly
by Galina Antova •
In my previous column, I wrote about the steady drumbeat of alerts, news reports, and actual attacks demonstrating that critical infrastructure has been in the crosshairs of nation-state threat actors and cyber criminals for years. Now, evolving intell…
Global Security News
For Smaller Enterprises Infrastructure Security Starts With Hygiene
by Gordon Lawson •
The surge of cyber attacks in 2021 was a wake-up call for consumers, who felt the firsthand effects that can result from a breach.
read more
Global Security News, Vulnerabilities
The VC View: The DevSecOps Evolution and Getting “Shift Left” Right
by William Lin •
As the world increasingly moves to the cloud and digital-everything, organizations’ risk postures have also changed. Embedding security into the business is the new, must-have approach and product security is the most seamless path to make it happen – …
Global Security News
How Linux Became the New Bullseye for Bad Guys
by Derek Manky •
Organizations need to secure, monitor and manage Linux just like any other endpoint in the network
read more
Global Security News
Achieving Sustainable Cybersecurity Through Proper Care and Feeding
by Laurence Pitt •
Climate change is probably the greatest threat our planet faces today, but this challenge also presents an opportunity to do the right thing. It’s time to step back and look at the role of the IT industry in developing, deploying, maintaining, growing …
Global Security News
Defending Your Business Against Russian Cyberwarfare
by Landon Winkelvoss •
We are likely to see Russian state sponsored attacks escalate as the West continues to increase sanctions and support Ukraine
read more
Global Security News
Why Ransomware Response Matters More Than Protection
by Torsten George •
As high-profile attacks of the Albuquerque Public School District, Kronos, CS Energy, Kaseya,
Global Security News
When Attacks Surge, Turn to Data to Strengthen Detection and Response
by Marc Solomon •
News of cyber criminals and nation-state actors capitalizing on events, planned or unplanned, for financial gain or to wreak havoc have dominated the headlines over the past few years. From COVID to elections to devastating weather events, and now the …
Global Security News
Today’s Network is Different, Not Dead – Here’s How You Secure It
by John Maddison •
Rapid changes to a network can easily result in gaps in protection and enforcement
read more
Global Security News
When Is It Right to Stay Silent?
by Joshua Goldfarb •
If you know that a person or group has poor intentions, it may make sense to begin documenting and reporting nefarious activity
read more
Global Security News
Economic Warfare: Attacks on Critical Infrastructure Part of Geopolitical Conflict
by Galina Antova •
We’ve known for years that since at least March of 2016, Russian government threat actors have been targeting multiple U.S. critical infrastructure sectors including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturin…
Global Security News
Think Like a Criminal: Knowing Popular Attack Techniques to Stop Bad Actors Faster
by Derek Manky •
Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques. By focusing on a handful of techniques, you can effectively shut down malware’s methods of choice for getting in…
Global Security News
Healthcare and the Other CIA
by Gordon Lawson •
For IT professionals, the acronym “CIA” refers to the Confidentiality, Integrity and Availability of information, not the Central Intelligence Agency. However, given the current threat level to data security, IT teams may wish they could get a little h…
Europe, Global Security News, North America
Insurance Companies: A “Tasty Morsel” to Cyber Criminals
by Mike Conti •
Yes, this is one of the tastiest morsels…to hack the insurers first—to get their customer base and work in a targeted way from there.” -Unknown Cybercriminal from the REvil group …
The post Insurance Companies: A “Tasty Morsel” to Cyber Criminals app…
Global Security News
The Importance of Open Source to an XDR Architecture
by Marc Solomon •
No longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, ransomware and wiper attacks are making headline news, impacting not only the organization but their stakeholders to…
Global Security News
The Need for Resilient Zero Trust
by Torsten George •
It is essential to ensure that any Zero Trust technology used is resilient to external factors
read more
Global Security News
Six Ways to Expand Your Fraud Program
by Joshua Goldfarb •
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
read more
Global Security News
The Elusive Goal of Network Security
by Marie Hattar •
While it’s never perfect, it can always get better
read more
Global Security News
US Charges Russian Hackers Over Infamous Triton, Havex Cyberattacks on Energy Sector
by Mike Lennon •
read more
Global Security News
Achieving Positive Outcomes With Multi-Domain Cyber and Open Source Intelligence
by Landon Winkelvoss •
The Many Faces of Threat Intelligence: Part 2
read more
Global Security News
A Sheep in Wolf’s Clothing: Technology Alone is a Security Facade
by Keith Ibarguen •
The power of the technology to defend our IT systems is only as good as our ability to evolve it in the face of ever-changing adversary tradecraft
read more
Global Security News
Demystifying Zero Trust
by John Maddison •
While many vendors use terms that include “zero trust,” they often use it to mean different things
read more
Global Security News
Public and Private Sector Security: Better Protection by Collaboration
by Laurence Pitt •
Bringing the resources of government and the private sector together to share knowledge creates a high-definition picture of cyber threats
read more