The Case for MarDevSecOps
Commentary | 10/30/2018 | Why security must lead the integration of marketing into the collaborative security and development model in the cloud.
Kaspersky: Most CISOs Say Cyber Attacks Are Inevitable
Jeffrey Burt | 10/30/2018 | The Kaspersky Lab report says that while the relationship between executives and CISOs is improving, there continues to be a disconnect around such issues as budgets and the risk of threats.
3 Keys to Reducing the Threat of Ransomware
Commentary | 10/26/2018 | Following these steps could mean the difference between an inconvenience and a multimillion-dollar IT system rebuild -- for the public and private sectors alike.
Securing Severless: Defend or Attack?
Commentary | 10/25/2018 | The best way to protect your cloud infrastructure is to pay attention to the fundamentals of application security, identity access management roles, and follow configuration best-practices.
Tackling Supply Chain Threats
Commentary | 10/24/2018 | Vendor-supplied malware is a threat that has been largely overlooked. That has to change.
Benefits of DNS Service Locality
Commentary | 10/24/2018 | Operating one's own local DNS resolution servers is one of the simplest and lowest-cost things an IT administrator can do to monitor and protect applications, services, and users from potential risks.
The Browser Is the New Endpoint
Commentary | 10/23/2018 | Given the role browsers play in accessing enterprise applications and information, it's time to rethink how we classify, manage, and secure them.
Understanding SOCs' 4 Top Deficiencies
Commentary | 10/22/2018 | In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.
Audits: The Missing Layer in Cybersecurity
Commentary | 10/18/2018 | Involving the audit team ensures that technology solutions are not just sitting on the shelf or being underutilized to strategically address security risks.
4 Ways to Fight the Email Security Threat
Commentary | 10/15/2018 | It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.
Gallmaker Attackers Living Off the Land, Symantec Finds
Jeffrey Burt | 10/15/2018 | Gallmaker, a new state-sponsored threat group, eschews custom malware for legitimate hacking tools and techniques to run under the radar while attacking government and military organizations in eastern Europe and the Middle East, according to recent research from Symantec.
The Better Way: Threat Analysis & IIoT Security
Commentary | 10/11/2018 | Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
Gemalto: 4.5B Records Breached in First Half of 2018
Larry Loeb | 10/10/2018 | Gemalto's Breach Level Index showed a staggering 133% increase in data breaches between the first half of 2017 and the first six months of this year. However, most of this malicious activity is attributable to two incidents – one involving Facebook.
Rotten Fruit: 4 Insider Threats to Watch Out For
Alan Zeichick | 10/8/2018 | When it comes to insider threats, it's best not to trust anyone. However, different employees pose different types of threats to the network. Here are the four types of 'rotten fruit' to look out for in your business.
|