3 Hybrid Cloud Security Challenges & Solutions

3 Hybrid Cloud Security Challenges & Solutions

The accelerated shift to the cloud was mostly borne out of necessity due to the influx of remote workers and changing customer demands requiring more business agility. According to Forrester, 94% of US enterprise infrastructure decision makers are using at least one type of cloud deployment. While there is a push to be cloud-native, the reality is that most companies will keep their “crown jewels” or critical systems on private clouds or on-prem, while leveraging…

Read More

Top 5 Cloud Security Innovations Presented at AWS re:Inforce 2022

Top 5 Cloud Security Innovations Presented at AWS re:Inforce 2022

A CNAPP can have many benefits if employed in your cloud environment, including: Increased perspective and better context of your cloud environment enables you to hunt, detect, investigate, and respond faster to threats. Consolidated security information allows you to see risks from across your cloud infrastructure and applications in a single compliance-aligned dashboard, leading to improved security posture. Allowing developers to focus on what they do best: developing. By baking security directly into each stage…

Read More

Metaverse Broadband Infrastructure Security

Metaverse Broadband Infrastructure Security

The term “metaverse” was originally coined by author Neal Stephenson for his 1992 cyberpunk novel Snow Crash to describe a virtual reality (VR) world. Nearly 30 years later, Facebook revitalized the term after rebranding themselves as Meta with the intent to focus research and development efforts on building the metaverse. Since the announcement, Meta has introduced Horizon Worlds; other big-name companies are working on new metaverse-friendly apps. While Gartner predicts that by 2026, people will…

Read More

Cyber Security Managed Services 101

Cyber Security Managed Services 101

MSPs can also perform regular testing of backups and disaster recovery plans to ensure that the most effective processes, procedures, and policies are in place when an attack strikes. Lastly, they can provide ongoing cyber awareness training to address user-specific paths like phishing and poor security hygiene, if contractually obliged. Cyber insurance No longer a nice-to-have, cyber insurance is an absolute must for organizations of any size. Unfortunately, an uptick in ransomware attacks and costly…

Read More

ZTNA vs VPN: Secure Remote Work & Access – SASE Part 2

ZTNA vs VPN: Secure Remote Work & Access – SASE Part 2

ZTNA vs. VPN While VPNs served their purpose in a strictly on-prem world, the accelerated migration to the cloud has revealed its limitations and new technologies are being ushered in. Amongst those, ZTNA is largely considered the evolution of VPN remote access due to several factors: Reducing the attack surfaceVPNs extend the network fabric across multiple differently located sites, which now includes notoriously insecure home offices. This expands the organization’s attack surface by connecting secure…

Read More

4 Cybersecurity Budget Management Tips

4 Cybersecurity Budget Management Tips

It’s never an ‘easy’ day for cybersecurity teams. On one hand, they’re facing the potential concerns related to an economic downturn, especially tech start-ups. And on the other hand, organizations of every size are experiencing a significant cybersecurity skills gap paired with budget cuts despite the fact that there’s more malicious cyber activity than ever, including state-sponsored attacks on US businesses. The good news is that history shows that cybersecurity teams are very unlikely to…

Read More

Business Email Compromise Attack Tactics

Business Email Compromise Attack Tactics

Business Email Compromise Attack Tactics Risk Management Is BEC more damaging than ransomware? What tactics are BEC actors using? How can organizations bolster their defenses? Jon Clay, VP of threat intelligence, tackles these pertinent questions and more to help reduce cyber risk. By: Jon Clay August 18, 2022 Read time:  ( words)  What is business email compromise (BEC)? BEC, also known as email account compromise (EAC), is a type of email cybercrime targeting companies with…

Read More

Top Five Patch Management & Process Best Practices

Top Five Patch Management & Process Best Practices

Organizations should start by only focusing on the bugs relevant to the application systems they use in-house. From that point, security teams can work to identify which of those bugs are being actively exploited and which are part of the business’s critical infrastructure. These are the key vulnerabilities to hone in on – the ones that could pose significant harm to your organization. The next is to identify those applications and/or operating systems that have…

Read More

Event-Driven Architectures & the Security Implications

Event-Driven Architectures & the Security Implications

In an era of rapid digitization, growth can come so quickly and massively that you cannot react fast enough. In a bid to keep up, the software industry developed new design paradigms and operational methodologies—like distributed systems, cloud computing, and Agile methodology. These new ways of doing things had one principle in common: Crush the rock into gravel, and you can do more with it. So, from the crushed rock of monolithic system design came…

Read More

Cyber Insurance Coverage Checklist: 5 Security Items

Cyber Insurance Coverage Checklist: 5 Security Items

Carriers who require EDR as a security control should accept XDR as a solution. And with the main objective being to improve security maturity, organizations should be looking to enhance detection and response capabilities beyond EDR with XDR. XDR is simply an extension of EDR. Whereas EDR only detects at the endpoint level, XDR can collect and correlate threat activity data across endpoints plus servers, cloud, networks, and email. Done well, XDR can help to…

Read More
1 6 7 8 9 10 16