Defusing the threat of compromised credentials

Defusing the threat of compromised credentials

Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a QR code. The email claims to come from a coworker, requesting your help in reviewing a document.  You scan the QR code with your phone and it takes you to what looks like a Microsoft 365 sign-in page. You enter your credentials; however, nothing seems to load.   Not thinking much of it, and being a…

Read More

3 tips to help bridge the gap between identity and security teams

3 tips to help bridge the gap between identity and security teams

Every year, we see the lines continue to blur between IT, operations and security teams, with many functions traditionally sitting with the CIO that may be better suited with the CISO — or at least need a dotted line to the security team. One such function is identity. Identity and Access Management traditionally manages access to systems, databases, devices, the cloud, SASS applications, remote access, multi-factor authentication (MFA) and account privileges rather than focusing on…

Read More

Security and AI Innovation: Creating New Opportunities for Partner Growth

Security and AI Innovation: Creating New Opportunities for Partner Growth

I’m on the heels of another incredible week of Cisco events—this time with our customers and partners at Cisco Live EMEA. My main takeaways for partners: we’re driving new security opportunities for you and simplified, effective security for all. Let’s dive into it a bit more. New Security and AI Advancements It really hit home for me when I heard Jeetu Patel on stage talking about how we’ve had more innovations in Cisco Security in…

Read More

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Network Detection & Response , Next-Generation Technologies & Secure Development , Security Operations Ashan Willy on Helping Clients Spot Hacker Techniques Insider Their Own 4 Walls Michael Novinson (MichaelNovinson) • February 3, 2023     Ashan Willy, CEO, Proofpoint (Image: Proofpoint) Proofpoint has long focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. See Also: Live Webinar | Navigating the…

Read More