How to Accelerate SecOps efficiency and extend capabilities with XDR

How to Accelerate SecOps efficiency and extend capabilities with XDR

By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every industry. From detecting inbound attacks to managing prevention technologies, to becoming experts in all forms of threat intelligence, these teams have required continuously upskilling, just to keep up with attackers’ tactics, techniques, and procedures. These challenges combined with the prevailing need for businesses to look…

Read More

Taking Zero Trust to the Edge

Taking Zero Trust to the Edge

No one can deny that networks have changed. With the rise in remote working and multi-cloud adoption, the traditional idea of the enterprise perimeter has changed. The move to cloud and hybrid networks made traditional leased line networks used for routing traffic back to data centers less relevant. Now networks are distributed and complex with more edges. Instead of a data center as a hub of the network, now software-defined wide area networks (SD-WAN) are…

Read More

Taking Back Control of Today’s Software Supply Chain

Taking Back Control of Today’s Software Supply Chain

By Jasmine Noel,  Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions around these risks in favor of a more holistic fact-based approach. While this threat has existed for a long time, the focus on supply chain attacks has grown in intensity just recently. It started late last year with the SolarWinds SunBurst attack and was followed…

Read More

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Welcome to part 4 in this series on multi-cloud use maturity.  A comprehensive eBook that includes the entire multi-cloud use maturity framework can be found here.  Today I want to focus on an area (data center modernization) that may be a bit counter intuitive given that this is a discussion centered on multi-cloud use. Hopefully, by the end of this blog you’ll see why data center modernization should be a critical part of most organization’s…

Read More

No, You Don’t Need

No, You Don’t Need

By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To underscore that point, the market was valued at $1.81 billion in 2020, according to Mordor Intelligence, and looks to increase to $6.9 billion by 2026 for a CAGR of 25.6% over the next five years. This is huge as more companies start to look into…

Read More

“Start Now Series” Helps You Learn Cisco Technologies and APIs

“Start Now Series” Helps You Learn Cisco Technologies and APIs

Right now, is a most exciting time to be in the tech industry. Infrastructures are evolving and the cloud is helping to extend services further and faster than ever. Which can seem overwhelming for some engineers, but remember every journey has a beginning. Whether you are a network engineer, application developer, or just interested in learning more about infrastructure automation, DevNet has a curated set of guided, hands-on learning content that will help you “Start…

Read More

Cloud Security Automation: The Fastest Path to Zero Trust

Cloud Security Automation: The Fastest Path to Zero Trust

By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and the federal government. In the wake of the SolarWinds Orion breach and the Colonial Pipeline ransomware attack, the Biden Administration issued a new Cybersecurity Executive Order (EO) that included specific guidance for government agencies to adopt Zero Trust architectures and technologies. This EO is, in many ways, a watershed moment for the security of government data, systems, and cloud environments. The inclusion…

Read More

Detect What Others Miss with CESA – Cisco Blogs

Detect What Others Miss with CESA – Cisco Blogs

With the executive order signed by the US government in the wake of recent cybersecurity attacks like SolarWinds, Colonial Pipeline, Microsoft Exchange server breach that have plagued high-value government entities and private organizations, it is very important to have security ammunition ready that can detect such attacks – one that can provide deep forensic details and visibility into your users and endpoints. In the SolarWinds breach, a form of supply chain attack, the attacker spent…

Read More
1 3,544 3,545 3,546 3,547 3,548 3,908