The Dual Solution to Zero-Day Attacks

Microsegmentation and file integrity monitoring (FIM) for peace of mind against zero-day attacks   When I speak to our clients, it’s clear that zero-day attacks represent one of the most challenging threats to ...

What is Malvertising?

What is malvertising, and what can security teams do about it?  ‘Malvertising’ has recently become a recurring part of security team conversations and stands out as a particularly insidious challenge. Malvertising, or ...

Leveraging Existing EDR Agents for Cybersecurity ROI

Organizations are increasing cybersecurity ROI by maximizing the use of their existing endpoint detection and response (EDR) agents No one is giving money away, budgets are getting increasingly tighter, and security teams ...

2024 Cybersecurity Forecasts and Recommendations

What are the big 2024 cybersecurity factors, and what can we do about them? Our industry is in constant flux, and staying ahead of emerging threats is a continuous and labor-intensive challenge ...

Software Supply Chain Security Resilience

How can security teams guarantee their software supply chain security is resilient against potential cyber threats?  The sophistication and proliferation of cyber threats have become daily news, and securing the software supply ...

The Strategic Shift from Internal Firewalls

The ‘internal firewalls approach’ to network security is being reevaluated After nearly twenty years in the security industry, I am always thrilled when I see a change in its collective mindset—the bulk ...

The Machine Learning Cybersecurity Revolution

Balancing the promise and pitfalls of machine learning cybersecurity The integration of machine learning (ML) has opened up new frontiers for defending against complex and evolving cyber threats. However, machine learning cybersecurity ...

What do Network Security Engineers Want?

What keeps network security engineers up at night, and how can they get a decent night’s sleep? Day to day, I speak to a lot of network security engineers as part of ...

How Can We Achieve Workload Hardening?

What are the workload hardening best practices, and how can we use them to strengthen cyber defense? Even the most casual observer can see that cyber threats are becoming more sophisticated – ...

Implementing Effective Access Controls

Using zero trust architecture for effective access controls in a perimeterless world  The traditional security perimeter has dissolved, giving rise to the necessity of a Zero-Trust Architecture (ZTA).   This strategic approach to ...

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)