Introducing MVISION Private Access | McAfee Blogs

Introducing MVISION Private Access | McAfee Blogs

Enabling Zero Trust Access with End-to-end Data Security and Continuous Risk Assessment The current business transformation and remote workforce expansion require zero trust access to corporate resources, with end-to-end data security and continuous risk assessment to protect applications and data across all locations – public clouds, private data centers, and user devices.  MVISION Private Access is the industry’s first truly integrated Zero Trust Network Access solution that enables blazing fast, granular “Zero Trust” access to…

Read More

How SCM Can Protect Against Skills-Based Errors and Mistakes

How SCM Can Protect Against Skills-Based Errors and Mistakes

People make up an important part of an organization’s security posture. That’s because some employees have the rights necessary for accessing sensitive data as well as the privileges for viewing and/or editing critical systems. If those individuals have the right focus and training, they can play a crucial part in keeping those assets safe against digital attackers. But if they aren’t paying attention, they could do something that puts their employer at risk. Take cloud…

Read More

Black Hat USA 2021 and DEF CON 29: What to expect from the security events

Black Hat USA 2021 and DEF CON 29: What to expect from the security events

Key topics analysts anticipate for these security conferences include supply chain attacks, Microsoft Exchange vulnerabilities and the iPhone/Pegasus spyware incident. Image: iStockphoto/nicescene Following a string of major cyberattacks and proposed initiatives by the U.S. government to better thwart them, cybersecurity has never been so uppermost on the minds of organizations and individuals around the world. That’s why this week’s Black Hat and DEF CON conferences promise to run hot and heavy with a host of…

Read More

Part One: Conceptual Differences Between SSF and PA-DSS

Part One: Conceptual Differences Between SSF and PA-DSS

To assist stakeholders in their migration from PA-DSS to the Software Security Framework, PCI Security Standards Council (PCI SSC) is publishing a series of blog posts to guide payment software vendors and assessors through the key differences between PA-DSS and the SSF. In Part One of our multi-part blog series, PCI SSC’s Sr. Manager, Public Relations Alicia Malone sits down with PCI SSC’s Sr. Manager, Emerging Standards Jake Marcinko to discuss some of the conceptual…

Read More

How to Accelerate SecOps efficiency and extend capabilities with XDR

How to Accelerate SecOps efficiency and extend capabilities with XDR

By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every industry. From detecting inbound attacks to managing prevention technologies, to becoming experts in all forms of threat intelligence, these teams have required continuously upskilling, just to keep up with attackers’ tactics, techniques, and procedures. These challenges combined with the prevailing need for businesses to look…

Read More

Taking Back Control of Today’s Software Supply Chain

Taking Back Control of Today’s Software Supply Chain

By Jasmine Noel,  Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions around these risks in favor of a more holistic fact-based approach. While this threat has existed for a long time, the focus on supply chain attacks has grown in intensity just recently. It started late last year with the SolarWinds SunBurst attack and was followed…

Read More

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Welcome to part 4 in this series on multi-cloud use maturity.  A comprehensive eBook that includes the entire multi-cloud use maturity framework can be found here.  Today I want to focus on an area (data center modernization) that may be a bit counter intuitive given that this is a discussion centered on multi-cloud use. Hopefully, by the end of this blog you’ll see why data center modernization should be a critical part of most organization’s…

Read More

No, You Don’t Need

No, You Don’t Need

By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To underscore that point, the market was valued at $1.81 billion in 2020, according to Mordor Intelligence, and looks to increase to $6.9 billion by 2026 for a CAGR of 25.6% over the next five years. This is huge as more companies start to look into…

Read More

Cloud Security Automation: The Fastest Path to Zero Trust

Cloud Security Automation: The Fastest Path to Zero Trust

By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and the federal government. In the wake of the SolarWinds Orion breach and the Colonial Pipeline ransomware attack, the Biden Administration issued a new Cybersecurity Executive Order (EO) that included specific guidance for government agencies to adopt Zero Trust architectures and technologies. This EO is, in many ways, a watershed moment for the security of government data, systems, and cloud environments. The inclusion…

Read More
1 2,166 2,167 2,168 2,169 2,170 2,591