Cyber Security Managed Services 101

Cyber Security Managed Services 101

MSPs can also perform regular testing of backups and disaster recovery plans to ensure that the most effective processes, procedures, and policies are in place when an attack strikes. Lastly, they can provide ongoing cyber awareness training to address user-specific paths like phishing and poor security hygiene, if contractually obliged. Cyber insurance No longer a nice-to-have, cyber insurance is an absolute must for organizations of any size. Unfortunately, an uptick in ransomware attacks and costly…

Read More

ZTNA vs VPN: Secure Remote Work & Access – SASE Part 2

ZTNA vs VPN: Secure Remote Work & Access – SASE Part 2

ZTNA vs. VPN While VPNs served their purpose in a strictly on-prem world, the accelerated migration to the cloud has revealed its limitations and new technologies are being ushered in. Amongst those, ZTNA is largely considered the evolution of VPN remote access due to several factors: Reducing the attack surfaceVPNs extend the network fabric across multiple differently located sites, which now includes notoriously insecure home offices. This expands the organization’s attack surface by connecting secure…

Read More

4 Cybersecurity Budget Management Tips

4 Cybersecurity Budget Management Tips

It’s never an ‘easy’ day for cybersecurity teams. On one hand, they’re facing the potential concerns related to an economic downturn, especially tech start-ups. And on the other hand, organizations of every size are experiencing a significant cybersecurity skills gap paired with budget cuts despite the fact that there’s more malicious cyber activity than ever, including state-sponsored attacks on US businesses. The good news is that history shows that cybersecurity teams are very unlikely to…

Read More

Business Email Compromise Attack Tactics

Business Email Compromise Attack Tactics

Business Email Compromise Attack Tactics Risk Management Is BEC more damaging than ransomware? What tactics are BEC actors using? How can organizations bolster their defenses? Jon Clay, VP of threat intelligence, tackles these pertinent questions and more to help reduce cyber risk. By: Jon Clay August 18, 2022 Read time:  ( words)  What is business email compromise (BEC)? BEC, also known as email account compromise (EAC), is a type of email cybercrime targeting companies with…

Read More

Top Five Patch Management & Process Best Practices

Top Five Patch Management & Process Best Practices

Organizations should start by only focusing on the bugs relevant to the application systems they use in-house. From that point, security teams can work to identify which of those bugs are being actively exploited and which are part of the business’s critical infrastructure. These are the key vulnerabilities to hone in on – the ones that could pose significant harm to your organization. The next is to identify those applications and/or operating systems that have…

Read More

Cyber Insurance Coverage Checklist: 5 Security Items

Cyber Insurance Coverage Checklist: 5 Security Items

Carriers who require EDR as a security control should accept XDR as a solution. And with the main objective being to improve security maturity, organizations should be looking to enhance detection and response capabilities beyond EDR with XDR. XDR is simply an extension of EDR. Whereas EDR only detects at the endpoint level, XDR can collect and correlate threat activity data across endpoints plus servers, cloud, networks, and email. Done well, XDR can help to…

Read More

Lessons from the Russian Cyber Warfare Attacks

Lessons from the Russian Cyber Warfare Attacks

Cyberwarfare tactics may not involve tanks and bombs, but they often go hand-in-hand with real combat. The Russian invasion of Ukraine is a prime example. Before Russian troops crossed the border, Russian hackers had already taken down Ukrainian government websites. And after the conflict started, the hacktivist group Anonymous turned the tables by hacking Russian media to shut down propaganda about the war. In these unprecedented times of targeted attacks against governments and financial institutions,…

Read More

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform Risk Management In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more unified approach to managing cyber risk. Trend Micro co-founder & CEO Eva Chen discusses our vision and strategy for delivering a unified cybersecurity platform. By: Trend Micro June 23, 2022 Read time:  ( words) Undoubtedly, COVID-19 has been a big accelerant for digital…

Read More

Managing Cyber Risk: The People Element

Managing Cyber Risk: The People Element

Blink and it seems a new ransomware group has taken an enterprise hostage. With ransomware and other cyber threats evolving and the attack surface constantly expanding, CISOs and security leaders are acutely aware of the need to minimize risk across people, processes, and technology. Trend Micro’s Jon Clay, VP of threat intelligence and Ed Cabrera, chief cybersecurity officer, discuss the importance of addressing the people element of security to minimize cyber risk. Top infrastructure risk:…

Read More

Benefits of Cyber Attribution for Better Cyber Risk Management

Benefits of Cyber Attribution for Better Cyber Risk Management

What does cyber attribution really mean? Is it just pointing a finger at the bad guy? This article explores the meaning of cyber attribution, the benefits, and how to leverage security tools to help your attribution efforts. What is cyber attribution? Cyber attribution is the process of tracking and identifying the perpetrator of a cyberattack or other hacking exploit, which enables organizations to gain a complete picture of an attack and enhance their cybersecurity strategy…

Read More
1 4 5 6 7 8