CISO May 30, 2017 Four New Cyberthreats on the CISO’s Radar 2 min read - An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
CISO February 22, 2017 Time to End the Tension Between Corporate Remediation and Security Teams 2 min read - Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.
February 13, 2017 Threat Hunting Is a Top Security Priority for 2017 2 min read - According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
Threat Hunting February 1, 2017 Enterprise Intelligence Brief: Threat Hunting Takes Center Stage 5 min read - Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
Network December 9, 2016 Avoiding Threat Management Rookie Mistakes 2 min read - Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.
CISO October 19, 2015 Making a Better Threat Management Sandwich 2 min read - Find the best way to compile everything you want into your threat management sandwich — without making it so big it's impossible to consume.
Network July 7, 2015 Sorting Through the Hype of Next-Generation Firewalls 2 min read - Ask the right questions of both your organization and your security vendor before taking the plunge with next-generation firewalls.
Advanced Threats June 10, 2015 Zero-Day Vulnerabilities Matter, but Don’t Ignore Known Issues 2 min read - Organizations funnel a lot of resources into defending against zero-day vulnerabilities, but these are not the only concerns they should pay attention to.
Endpoint May 4, 2015 Mobile Avengers: Smashing Security Foes and Woes 2 min read - Mobile app management and a corporate app store provide good training grounds for increased security in a controlled mobile state.