3 Strategies for Better Security and Compliance
If you’ve ever rowed a boat with someone else, you know that it’s very difficult to make progress if two people are rowing in different directions. Imagine if you could add a third rower trying to pull you off in another direction entirely. According to a new report, that is ... Read More
Coordinating Efforts for More Effective Security and Compliance
A company is a single entity, but it is comprised of various teams and individuals. Everyone in the company is ostensibly working toward common goals and objectives, but the perspectives and priorities can vary—and sometimes overlap or conflict—from one department to the next, especially when it comes to cybersecurity and ... Read More
The Practical, Ethical, and Compliance Challenges of Data Privacy
Today is Data Privacy Day. Businesses and individuals around the world recognize January 28 as a day to raise awareness about data privacy challenges and reiterate data protection best practices. One of the things that is still often missed, though, is that it’s not realistic to approach data privacy from ... Read More
Patch or Mitigate Dangerous Microsoft Windows CryptoAPI Spoofing Vulnerability ASAP
Qualys is a sponsor of TechSpective Microsoft kicked off the new decade with a bang. Last Tuesday was the first Microsoft Patch Tuesday of 2020, and one of the patches pushed out by Microsoft addresses a dangerous flaw in Crypt32.dll that could allow attackers to spoof signatures on encrypted communications ... Read More
Menlo Security Transcends the Almost Secure Cybersecurity Paradigm
Companies of all sizes, across all industries, and from every region of the world all seem to follow the same basic cybersecurity strategy. That would make sense if it worked, but businesses continue to cling to an outdated model of cybersecurity despite overwhelming evidence that it’s not very effective. There ... Read More
Improving and Automating Threat Intelligence for Better Cybersecurity
Devo is a sponsor of TechSpective Cybersecurity is challenging. It is a daunting exercise to protect a complex hybrid cloud infrastructure from a rapidly evolving and expanding threat landscape. Organizations invest significant time, money and resources to deploy and manage a suite of firewalls, endpoint security, intrusion detection, and other ... Read More
Protecting the ‘Crown Jewels’ with Threat Hunting
Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch efficiently and do a poor job of understanding emerging threats. The threat landscape has shifted and accelerated, and organizations need ... Read More
Qualys Introduces VMDR: Vulnerability Management, Detection, and Response
Qualys is a sponsor of TechSpective Qualys customers and executives are gathered in Las Vegas this week for the annual Qualys Security Conference. The event officially kicks off with an opening keynote on Wednesday morning, but Qualys wanted to get the party started a little early with the announcement of ... Read More
Fortress Information Security Strives to Help Protect Critical Infrastructure
The agencies and businesses that make up the backbone of our critical infrastructure have a larger bullseye on their backs than an average company. When it comes to the electric utility providers that manage the power grid, the exposure to risk is exacerbated by the fact that much of the ... Read More
Time Is Money—Poor PAM Can Cost You Both
Most cyberattacks use valid credentials one way or another. Whether it’s an actual insider attack from a disgruntled employee or an external attack using hacked or stolen credentials, at the point of access to sensitive systems or data, the attack appears to be legitimate activity at face value. That is ... Read More