Application Security February 7, 2019 Moving to the Hybrid Cloud? Make Sure It’s Secure by Design 4 min read - Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
CISO February 1, 2019 Data Breach Fatigue Makes Every Day Feel Like Groundhog Day 5 min read - The incessant stream of high-profile data breaches can make every day seem like Groundhog Day. How can businesses combat data breach fatigue and rebuild trust through improved breach response?
Data Protection January 29, 2019 How to Build a System Hardening Program From the Ground Up 6 min read - System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.
Endpoint January 24, 2019 As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? 4 min read - While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
Threat Hunting January 22, 2019 Embrace the Intelligence Cycle to Secure Your Business 5 min read - Whether you're protecting data, financial assets or even people, the intelligence cycle can help you gather data and contextualize it in terms of what you already know and what you hope to learn.
January 14, 2019 The Dark Overlord Claims to Have Stolen Secrets of 9/11 Attacks in Law Firm Data Breach 2 min read - The threat group known as The Dark Overlord has claimed responsibility for a law firm data breach involving files allegedly related to the 9/11 terrorist attacks.
Data Protection January 9, 2019 Deciphering the Encryption Paradox 2 min read - The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.
January 7, 2019 HHS Publishes Voluntary Healthcare Cybersecurity Practices for Medical Organizations 2 min read - The U.S. Department of Health and Human Services (HHS) released voluntary healthcare cybersecurity practices to help medical organizations strengthen their security posture.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Data Protection January 2, 2019 Lessons From the Data Encryption Front Line: Understanding Common Threats 4 min read - There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.