visibility
What is Micro Breaching?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Security Research, visibility, zero trust
What is micro breaching, and how can organizations defend themselves? Not all attacks make headlines with massive data leaks or crippling ransomware attack impacts. Enter the realm of “micro breaching,” a subtle ...
What is GRC, and Why is it Important for Cybersecurity?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, TrueFort, visibility, zero trust
Within cybersecurity, what is GRC, and why is it so important? GRC is a benchmark for structured strategy, encompassing governance, risk, and compliance. These are important CISO responsibilities and as critical for ...
Bringing Fashion Industry Cybersecurity in Vogue
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, security, Security Research, Supply Chain Attacks, visibility, zero trust
Fashion industry cybersecurity needs to become a part of the industry fabric As the fashion industry looks to the future with digital innovation, the looming shadow of cybercrime threatens to unravel ...
Insider Risk Management Software Essential Components
Nik Hewitt | | advice, baselining, Best Practices, Cybersecurity, insider threat, next gen security, security, Security Research, TrueFort, visibility, zero trust
Insider risk management software must address the essential requirements of the modern SOC Managing insider risk is a growingly complex challenge that organizations must face in protecting their critical data and systems ...
Maintaining Control and Visibility in Hybrid Environments
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, service accounts, visibility, zero trust
The challenges and solutions to maintaining control and visibility in hybrid environments Many organizations have transitioned to hybrid and multi-cloud deployments, with tens of thousands more businesses on the way. This shift, ...
AWS re:Invent 2023: Cybersecurity Visibility
Shira Rubinoff talks with CySight's Rafi Sabel at AWS re:Invent 2023 ...
Security Boulevard
The Evolution of Payment Card Cybersecurity for Retailers
Nik Hewitt | | advice, application protection, applications, baselining, Best Practices, CISO, Cybersecurity, device protection, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
Using payment card cybersecurity to protect retail against emerging threats means proactive strategies Within retail cybersecurity, protecting payment card information remains a pivotal concern for CISOs, CTOs, and cybersecurity teams. The world ...
Agent vs. Agentless: A New Approach to Insider Risk Monitoring
Kellie Roessler | | agent, Agentless, Employee Monitoring, Insider Risk Management, insider risk monitoring, uam, visibility
A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The short answer is: “A bit of both, but better.” Technically speaking, InTERCEPT is ...
Bridging the Gap as OT Networks Integrate with IT Environments
As OT networks integrate with IT environments, how can we bridge the gap to promote robust security? The (sometimes intricate) lines between Operational Technology (OT) networks and Information Technology (IT) environments are ...
Understanding and Preparing for PCI DSS 4.0
Nik Hewitt | | advice, Best Practices, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The March 2025 deadline for PCI DSS 4 compliance is closer than we think With the ongoing evolution of cybersecurity threats and payment technologies, adapting to newer compliance standards is more crucial ...