Security Controls

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25
Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...

How to Enhance Security Without Affecting the Customer Experience
Navigating the landscape of customer interactions is a delicate balancing act that requires constant calibration between security and operability (or usability, if speaking from a customer’s perspective) ...

Closing the False Positives Gap for SOC Efficiency
Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...

Zero-Trust Alone Won’t Save You
With all the chatter surrounding zero-trust, it seems mature initiatives should be chugging along by now. But Gartner just threw a bucket of reality on the market with its prediction that in ...
Complying with the Egypt Financial Cybersecurity Framework: What you Should Know
Which cybersecurity framework is the best one to use for an organization? This is one of the most frequently asked questions when embarking on the cybersecurity journey. Often, the answer falls quite ...
Foundational Activities for Secure Software Development
Follies The Broadway Tower in Worcestershire, England is a famous structure. It’s inspiring, beautiful, and at 62 feet high, like other similar buildings, it’s a folly. While it looks grand inside and ...
Neither Pointless Nor Boring: Pop It and Lock It Down with CIS Controls
I’m delighted to share that I will be speaking for the first time at SecTor this year. The talk will be in Theatre 1 at 1:15pm on October 5th. In the session ...
Major Database Security Threats & How You Can Prevent Them
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
Strong Authentication Considerations for Digital, Cloud-First Businesses
Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is ...
How Penetration Testing can help prevent Ransomware Attacks
It is hard to believe, but ransomware is more than three decades old. While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the ...