Guide to Better Threat Detection and Response

Guide to Better Threat Detection and Response

Not all threats originate at the endpoint. According to Verizon’s 2022 Data Breach Investigations Report, web applications and email are the top two vectors for breaches. XDR enables you to detect compromised accounts sending internal phishing emails, whereas native email security tools typically only monitors for malicious emails being delivered externally. XDR will also sweep mailboxes for IoCs in real time. With this information, the SOC can investigate who else received the email as well…

Read More

Top Cloud Security Challenges & How to Beat Them

Top Cloud Security Challenges & How to Beat Them

An overview of how ngrok, a cloud tunnelling service, works. What’s at risk With access to a developer’s machine, cybercriminals can take advantage of local admin privileges or the shared work-in-progress to seed malware. They can also use hijacked credentials to get into the organization’s cloud dev environment or other systems, potentially accessing sensitive information or injecting vulnerabilities into application source code and pipelines. These kinds of breaches are hard to detect because the associated…

Read More

Enhance Cyber Defense with 2022 Cybersecurity Trends

Enhance Cyber Defense with 2022 Cybersecurity Trends

To modernize your cybersecurity strategy, you must understand the imminent risks. Our Midyear Roundup Report helps CISOs and security leads anticipate what’s next, enabling a stronger cyber defense strategy to recognize, assess, and mitigate cyber threats. Trend Micro Midyear 2022 Cybersecurity Roundup Report Each summer, Trend Micro analyzes and correlates attack surface intelligence from approximately 400,000 commercial customers and 20 million consumer customers, alongside data lakes and partnering with third-party research firms. We also review…

Read More

Secure Web Gateway (SWG) Security – SASE Part 3

Secure Web Gateway (SWG) Security – SASE Part 3

How does it all work? First, it starts out with knowing your users and environment. By deploying sensors and integrating with common SaaS apps directly such as Microsoft Office, Google Workspace and many Identity Providers (Azure AD, Active Directory, Okta, etc.), a profile is built around the user and environment. This profile, made up of user and application behavior, can determine risk to the organization and suggest access control policies. Traffic from the ZTNA is…

Read More

CISA Gov Alert: 2023-25 Plan Focuses on Unified Cybersecurity

CISA Gov Alert: 2023-25 Plan Focuses on Unified Cybersecurity

Breakdown of CISA Strategic Plan Goals & Objectives A strategy is a Litmus test for evaluating alternate plans or a guide for investing scare resources. This document plan does not meet those requirements. Instead, it lists a set of noble aspirations and goals. Goal 1: Cyber Defense, and Goal 2: Risk Reduction and Resilience, are core to CISA’s mission to protect critical infrastructure. Goal 3: Operational Collaboration and Goal 4: Agency Unification, speak to the…

Read More

Incident Response Services & Playbooks Guide

Incident Response Services & Playbooks Guide

Cybersecurity Awareness Month 2022 Series No matter the size of a business, it faces the risk of a cyberattack. Over 50% of organizations experienced a cyberattack. And while proactive protection is ideal, there is no silver bullet when it comes to security—meaning you should plan for incident response as well. Yet, 63% of C-level executives in the US do not have an incident response plan, according to a report by Shred-It. That’s where an incident…

Read More

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Decrease the Risk Assessment Time Gap Towards Continuous Assessment Semi-annual penetration tests get a box checked and keep you out of compliance jail, but cybersecurity has moved to near-real time and so too must your assessment. Continuous monitoring has been an important goal, but we need to advance it to making continuous decisions based on that continuous monitoring. Even events such as authenticating to use a VPN are too infrequent to make actionable judgements: in…

Read More

Pros and Cons of 5G

Pros and Cons of 5G

With the introduction of the 5G Stand Alone (SA) method for operating a 5G base station independently by an independent 5G core network, 5G will finally be able to simultaneously support three different requirements: enhanced mobile broadband (eMBB) (high speed and large capacity), ultra-reliable and low-latency communication (URLLC), and massive machine type communication (mMTC) (ultra-mass terminal). Pros and Cons of 5G According to Deloitte Insights, there were 756 private network deployments in enterprises worldwide as of…

Read More

Biden Cybersecurity Executive Order: Ex-US Secret Service Reflects

Biden Cybersecurity Executive Order: Ex-US Secret Service Reflects

In response to the crippling ransomware attack on Colonial Pipeline, President Biden signed Executive Order 14028, “Improving the Nation’s Cybersecurity,” on May 12, 2021. Biden’s Executive Order aimed to protect critical infrastructure from further attacks by modernizing the nation’s cybersecurity. Reflecting on the past 15 months, I look at the effectiveness of the Executive Order, its challenges, and what CISOs from businesses of all sizes and sectors can learn to strengthen their cybersecurity strategies. Overview…

Read More

3 Hybrid Cloud Security Challenges & Solutions

3 Hybrid Cloud Security Challenges & Solutions

The accelerated shift to the cloud was mostly borne out of necessity due to the influx of remote workers and changing customer demands requiring more business agility. According to Forrester, 94% of US enterprise infrastructure decision makers are using at least one type of cloud deployment. While there is a push to be cloud-native, the reality is that most companies will keep their “crown jewels” or critical systems on private clouds or on-prem, while leveraging…

Read More
1 2 3 4 5