3 Cybersecurity Trends & Mitigation Strategies

3 Cybersecurity Trends & Mitigation Strategies

We’ve also seen an increase in “living off the land” attacks where cybercriminals leverage legitimate tools within an enterprise’s network to avoid detection before exfiltrating data. These attacks usually occur during working hours to seem more legitimate. Lastly, Bitcoin has become seemingly integral to ransomware. It’s anonymous, difficult to track, fast, and easy. What more could a bad guy want? It’s no wonder the amount of cryptocurrency funds from ransomware skyrocketed 311% from 2019 to…

Read More

How to Use Zero Trust Security for the Hybrid Cloud

How to Use Zero Trust Security for the Hybrid Cloud

Applying a zero trust approach to DevOps processes is critical to ensuring secure apps. Especially considering some parts of the part are built in-house, other components use tech purchased or leased from other vendors, and some of it is composed of open source code. The software supply chain must be protected by authenticating users’ credentials, continuously monitoring the network and user behavior, and vetting any third-party or open source technology brought on board. Will all…

Read More

3 Remote Work Security Tips for CISOs

3 Remote Work Security Tips for CISOs

Remote and hybrid work environments are here to stay, which means CISOs need to establish an effective security strategy for managing the expanding attack surface. Organizations can no longer afford (quite literally) to play catch-up with remote work security as ransomware cases and demands continue to rise. Greg Young, Trend Micro’s VP of cybersecurity and Mick McCluney, technical lead for Trend Micro Australia, explore how to create a resilient work from home (WFH) security strategy….

Read More

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape Detection and Response Trend Micro’s VP of Threat Intelligence, Jon Clay, explores the latest trends in today’s threat landscape and why XDR is key to enabling more resilience. By: Jon Clay December 13, 2021 Read time:  ( words) I’m proud to share the Forrester New Wave™: for Extended Detection and Response (XDR) that named Trend Micro a Leader in both current offerings and strength of strategy. I’d…

Read More

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together

XDR alone is an effective security capability. However, when used in tandem with the Zero Trust approach, organizations can further enhance their security. XDR has two significant assets that can support a Zero Trust strategy: strong endpoint (user, cloud workload, device, etc) controls and organization-wide data collection and correlation from across the IT infrastructure. Here’s how it works: Strong endpoint controls deliver a solid foundation for verifying and establishing trust by providing security teams with…

Read More

Four benefits of a software-defined approach to network security

Four benefits of a software-defined approach to network security

Four benefits of a software-defined approach to network security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Chris Fallon named CIO at Fortune Brands GPG

Chris Fallon named CIO at Fortune Brands GPG

Chris Fallon named CIO at Fortune Brands GPG | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Enterprise Strategy Group Verifies Valuation of XDR Solutions

Enterprise Strategy Group Verifies Valuation of XDR Solutions

  Why XDR It’s been established that EDR doesn’t do enough to detect threats—it is, after all only on the endpoint and over 90% of threats enter the enterprise through email and other avenues. And while many respondents considered SIEM their most valuable tool for threat detection and response, they also faced many challenges with it. Namely, 57% said they had operation and resource issues, 58% noted there was room for improvement with upfront correlation…

Read More

Will the convergence of IGA, PAM and AM fix the fractured identity landscape?

Will the convergence of IGA, PAM and AM fix the fractured identity landscape?

Will the convergence of IGA, PAM and AM fix the fractured identity landscape? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Reduce Friction Between IT Leaders and C-suite

Reduce Friction Between IT Leaders and C-suite

In addition, more than 80% of IT managers surveyed felt pressured to downplay the severity of cyber risks to their board in fear of sounding too negative or repetitive. While an understandable concern, IT leaders play a critical role in helping the boardroom clearly understand the cyber risk landscape in order to boost cybersecurity investments and enable the organization to grow. Disagreements aren’t only between IT leaders and the C-suite, friction between IT and business…

Read More
1 7 8 9 10