The Struggle with Threat Intelligence Kevin SwanOctober 16, 20220578 views Driven by a vast majority of security professionals who consider cyber threat intelligence a valuable resource in finding and dealing with security threats, the adoption of threat intelligence services and capabilities continues to take off. Yet, security analysts continue to slowly adopt the technology needed to make better use of threat data. In fact, “taking advantage of cyber threat intelligence” represented one of the top security challenges for nearly 30% of respondents according to the 2021 State of Security Operations Report published by CyberRes.… Read more
The Insider Threat Problem: Your biggest threat may already be inside! Nik EarnestOctober 16, 20220533 views With insider threats it’s not a matter of if, but rather a question of when your organization will be hit. Just last week HackerOne, a security company, dealt with a rogue employee stealing data reported through the company’s bug bounty system. According to the article, the insider threat actor was turning around and using the privileged data to claim bounties directly from the affected companies, making a tidy profit.… Read more
Why it’s Time to Get Proactive About Security Thomas GloerfeldOctober 16, 20220270 views Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon to get carried away. In fact, separate research reveals that many organizations still treat security as an afterthought, until they’re breached. It’s 2022 and organizations can do better.… Read more
XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD Steve TcherchianJune 20, 20220266 views It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days. Read more
Managing Unstructured Data with Cohesity SmartFiles on HPE CohesityJune 20, 20220323 views The explosion of unstructured data growth has tasked organizations with not only managing and storing application data but also with gaining insights from that data while keeping costs under control. This is no simple task. Read more
Continuous Data Protection: The new imperative Ziv KedemMarch 27, 20220388 views Recent world events have heightened concerns about data security. Stricter laws and increased risk of cyber attacks have forced businesses to prioritize data protection measures and implement them quickly. Read more
To bring strategy back into your security, turn to chess Ramsés GallegoDecember 6, 20210362 views In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight. Read more
Getting Started with Data-centric Security Dan SimmonsDecember 6, 20210323 views With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations. Read more
Cyber security awareness: How to establish an effective program John F McDermottSeptember 21, 20210266 views In today’s challenging environment, cyber security awareness programs must deliver much more than just the ability to check a compliance box. Here’s a straightforward model to ensure that your training is really changing behavior. Many organizations believe that merely providing a series of videos or mandating an annual “must-watch” video will solve the cyber security awareness “problem.” I sincerely beg to differ.… Read more
Making the move to zero trust architecture: 4 key considerations Jeff EntersSeptember 21, 20210302 views New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion. Fortunately, we’re moving beyond that now.… Read more