Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25

Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...
customer, experience, security

How to Enhance Security Without Affecting the Customer Experience

Navigating the landscape of customer interactions is a delicate balancing act that requires constant calibration between security and operability (or usability, if speaking from a customer’s perspective) ...
Security Boulevard
security, SOC, AI, platform, Fortinet, human, SOC, SMBs, SOCs, SOCs, false positives, SOC

Closing the False Positives Gap for SOC Efficiency

Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard
remote, ZTNA, security, zero-trust architecture, organization, zero-trust, trust supply chain third-party

Zero-Trust Alone Won’t Save You

With all the chatter surrounding zero-trust, it seems mature initiatives should be chugging along by now. But Gartner just threw a bucket of reality on the market with its prediction that in ...
Security Boulevard

Complying with the Egypt Financial Cybersecurity Framework: What you Should Know

Which cybersecurity framework is the best one to use for an organization?  This is one of the most frequently asked questions when embarking on the cybersecurity journey.  Often, the answer falls quite ...

Foundational Activities for Secure Software Development

Follies The Broadway Tower in Worcestershire, England is a famous structure. It’s inspiring, beautiful, and at 62 feet high, like other similar buildings, it’s a folly. While it looks grand inside and ...

Neither Pointless Nor Boring: Pop It and Lock It Down with CIS Controls

I’m delighted to share that I will be speaking for the first time at SecTor this year. The talk will be in Theatre 1 at 1:15pm on October 5th. In the session ...

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...

Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets.  The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is ...

How Penetration Testing can help prevent Ransomware Attacks

It is hard to believe, but ransomware is more than three decades old.  While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the ...