Cloud Security February 2, 2018 Cloud Security Is a Moving Target 2 min read - There are many misconceptions about cloud security, but one thing is for certain: Cybercriminals will always target high-value data wherever it resides.
Identity & Access January 12, 2018 Don’t Leave Your Keys in the Ignition — Safeguard High-Value Data With Privileged Access Management 2 min read - For cybercriminals, failing to protect privileged credentials is like leaving the keys in your ignition. Implementing privileged access management is a crucial step toward minimizing cyber risks.
CISO January 3, 2018 No Place For Passivity in Cybersecurity Leadership 2 min read - Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur.
Application Security December 14, 2017 From Waterfall to SecDevOps: The Evolution of Security Philosophy 2 min read - Unlike the waterfall and agile approaches to development, SecDevOps requires security to be built into projects from the outset, not bolted on afterward.
Risk Management December 11, 2017 Revisiting the Top Security Threats of 2017 3 min read - Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
Cloud Security December 5, 2017 Bringing Shadow IT Into the Security Light 2 min read - Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.
Network November 20, 2017 Don’t Let Network Complexity Tangle Up Your Security Strategy 2 min read - Overwhelmed network managers can significantly reduce network complexity by using automation in tandem with a well-defined policy.
Endpoint November 17, 2017 Fileless Malware Prompts Evolution of Endpoint Defenses 2 min read - A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses.
Cloud Security November 14, 2017 Evolving Cloud-Native Applications Require New Best Practices 2 min read - As cloud-native applications become faster and more flexible, the security solutions that protect these applications must take on the same characteristics.
Application Security November 7, 2017 SecDevOps: Putting Security at the Heart of DevOps 2 min read - A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.
Fraud Protection October 19, 2017 Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge 3 min read - Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
Cloud Security October 11, 2017 Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption 2 min read - Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.