Analytics at the source: A distributed approach to network security

Analytics at the source: A distributed approach to network security

Network visibility and Network Detection and Response (NDR) solutions are deployed to collect, view and analyze network activity to detect suspicious and malicious activity on the network. The majority of these solutions are built to move data from a collection point (or sensor) to a central repository for analysis. This approach has several downsides including issues of scale, performance, cost and accuracy (false positives). All of these problems can be overcome by solutions that perform…

Read More

The global lessons learned from the July 19 Crowdstrike event

The global lessons learned from the July 19 Crowdstrike event

Friday, July 19th, 2024, was an unforgettable day, albeit for all the wrong reasons.  A global technical outage linked to the cybersecurity firm CrowdStrike grounded flights, crashed enterprise Windows-based systems, and underscored the fact that the dependencies within the world’s IT infrastructure are so fragile and critical that a small bug can bring it to its knees.  Despite the fact that the event’s impacts echoed the effects of a widespread ransomware attack, Crowdstrike CEO George…

Read More

Overcoming the IT skills gap and maintaining a secure business

Overcoming the IT skills gap and maintaining a secure business

Technology continues evolving and advancing at a rapid speed, ringing in unparalleled opportunities, but also creating new vulnerabilities. With this comes the demand for a workforce equipped with up-to-date skills to counter emerging threats. However, the pace of skill acquisition often lags the evolving threat landscape – opening organizations to increased risks.  According to a Statista report looking at global talent shortages, 54% of organizations experienced a skills shortage in tech in 2023. Yet this skills gap…

Read More

Pentesting accounts for an average of 13% of total IT security budgets

Pentesting accounts for an average of 13% of total IT security budgets

A report by Pentera has revealed that enterprises continue to emphasize pentesting as a tool for security validation strategies. Among surveyed respondents, pentesting takes up an average of 13% of the security team’s budget, or an average of $164,400. The report surveyed 450 CIOs, CISOs and IT security leaders to gather this data, shedding light on how enterprises are approaching security validation.  As breach efforts from malicious actors continue to evolve, the subsequent losses from…

Read More

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

Australia is about to get a national online ID system — the Digital ID — which promises to improve the security and privacy of data online. However, concerns among Australians persist. In just a few months, Australians will have access to a new form of ID, which aims to make identification online much safer. It’s called the Digital ID, and it will form a cornerstone of the government’s strategy to improve the security of data…

Read More

Overcoming challenges in a changing security industry

Overcoming challenges in a changing security industry

Overcoming challenges in a changing security industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Rushing into generative AI is risky: How to protect data

Rushing into generative AI is risky: How to protect data

Rushing into generative AI is risky: How to protect data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Jon Raper named CISO at Costco

Jon Raper named CISO at Costco

<!– Jon Raper named CISO at Costco | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

John Edwards named CIO of WTS International

John Edwards named CIO of WTS International

John Edwards named CIO of WTS International | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Wesley Story joins Genesys as Chief Information Officer

Wesley Story joins Genesys as Chief Information Officer

Wesley Story joins Genesys as Chief Information Officer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2