Endpoints are our new perimeters

| | endpoint, perimeter, zero trust
The evolution of the security perimeter ...

Endpoints are our new perimeters

| | endpoint, perimeter, zero trust
The evolution of the security perimeter ...
Strong protection in uncertain times

Strong protection in uncertain times

A hacker mentality is keeping (computer) virus testing on track. Latest endpoint protection reports now online for enterprise, small business and home users. This is the first in our series of 2020 endpoint protection reports. And ...
Securing Remote Vendor Access

Gold Standard Cybersecurity for the Gig Economy

Gold Standard Cyber Security for the Gig Economy The ‘gig’ economy is said to be many things – but one thing that isn’t talked about enough is the potential cyber attack vectors ...
Privileged Access Management (PAM)

Boldly Go Farther with Greater Efficiency for PAM

CyberArk today announced version 11.3 of its flagship solution for enterprises – the CyberArk Privileged Access Security Solution. Speaking of flagships and enterprises, it turns out that it’s possible to learn a ...
SOC It 2 Me:  CyberArk Achieves SOC 2 Type 2 Compliance

SOC It 2 Me: CyberArk Achieves SOC 2 Type 2 Compliance

Service Organization Control (SOC) 2 is an auditing procedure that ensures service providers are securely managing data to protect the interests of their customers, their customers’ customers and so on. This stringent ...

Sandboxing in Cyber Security: How Does It Fit In Your Stack?

There’s no shortage of options when it comes to protecting corporate information from malware. A typical security stack includes everything from antivirus, firewalls, and data loss prevention (DLP), to network security and ...
Gilad Maayan

Endpoint Detection and Response: Securing Your Borders

The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI ...
Secure developer workstations with least privilege

Secure Developer Workstations Without Slowing Them Down

| | endpoint
Fueled by automation, the adoption of DevOps processes and more, the role of the developer has become increasingly important and widespread for enterprises going through digital transformation. Developers need access to privileged ...

Are Password Managers Good Enough to Protect You?

| | endpoint, events, Surveys
October is National Cybersecurity Awareness Month and, over the past few weeks, we’ve written blogs highlighting this year’s themes: Own it. Secure it. Protect it. We wrote about the opportunity and risk ...