Cybersecurity

The Struggle with Threat Intelligence

Driven by a vast majority of security professionals who consider cyber threat intelligence a valuable resource in finding and dealing with security threats, the adoption of threat intelligence services and capabilities continues to take off.

Yet, security analysts continue to slowly adopt the technology needed to make better use of threat data. In fact, “taking advantage of cyber threat intelligence” represented one of the top security challenges for nearly 30% of respondents according to the 2021 State of Security Operations Report published by CyberRes.…

Read more

The Insider Threat Problem: Your biggest threat may already be inside!

With insider threats it’s not a matter of if, but rather a question of when your organization will be hit. Just last week HackerOne, a security company, dealt with a rogue employee stealing data reported through the company’s bug bounty system. According to the article, the insider threat actor was turning around and using the privileged data to claim bounties directly from the affected companies, making a tidy profit.…

Read more

Why it’s Time to Get Proactive About Security

Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon to get carried away. In fact, separate research reveals that many organizations still treat security as an afterthought, until they’re breached.

It’s 2022 and organizations can do better.…

Read more

To bring strategy back into your security, turn to chess

In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight.
Read more

Getting Started with Data-centric Security

With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations.
Read more

Cyber security awareness: How to establish an effective program

In today’s challenging environment, cyber security awareness programs must deliver much more than just the ability to check a compliance box. Here’s a straightforward model to ensure that your training is really changing behavior.

Many organizations believe that merely providing a series of videos or mandating an annual “must-watch” video will solve the cyber security awareness “problem.” I sincerely beg to differ.…

Read more

Making the move to zero trust architecture: 4 key considerations

New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business.

The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion.

Fortunately, we’re moving beyond that now.…

Read more