Are You Ready To Automate Your Cloud Account Security?

A Security Analyst, A Lead Developer, And A Cloud IT Admin Walk Into A Bar… Stop me if you’ve heard this one before. When we talk to users about the ways that ...

5 Risks You Need to Remember When Securing Your Containers

Containers are on the rise. As reported by GlobalNewswire, Allied Market Research estimated that the application market would grow from its 2016 value of $698 million to $8.20 by 2025. With a ...
compliance

Using Zero Trust to Ease Compliance

The era of compliance and business and consumer demand for privacy is upon us The rising number of privacy and compliance standards has increased anxiety among many enterprise owners. Between PCI-DSS to ...
Security Boulevard

Zero-day Vulnerabilities and the Visibility Gap Challenge During Mass Remote Work

As the world collectively deals with COVID-19, many organizations have enacted company-wide work from home policies to help slow the spread of the virus. For many organizations the sudden requirement to support ...
11 Ways to Strengthen Cyber Hygiene With a Remote Workforce

11 Ways to Strengthen Cyber Hygiene With a Remote Workforce

| | iot, visibility
Now more than ever, it is critical that security leaders take measures to ensure cyber hygiene across their enterprise. Malicious actors are launching attacks against organizations of all sizes and their employees, ...
An Eye on IoT Security

An Eye on IoT Security

| | iot, visibility
Ever heard of the “Star Trek” effect? If you show imaginary, cool, futuristic technology in a movie or show, technologists of all ages will do their best to make it come true ...
The Exploding Enterprise Attack Surface

The Exploding Enterprise Attack Surface

| | Cybersecurity, visibility
When Jerry and David’s Guide to the World Wide Web was launched in 1994, there were roughly 2,500 websites in the directory (including the very first website, created by Tim Berners-Lee at ...
The Evolution of Threat Hunting

The Evolution of Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...

Cloud Security Threats: Escaping the Egregious Eleven – Part Two

Depending on your familiarity with the Cloud Security Alliance (CSA) publications, part one of this blog was intended as either an introduction or a nagging reminder of the ‘Egregious Eleven’ security threats ...
An open conversation about cyber-risk reporting to the BOD

An open conversation about cyber-risk reporting to the BOD

A few days ago, I had the privilege of moderating a boardroom discussion of CISOs at the Evanta Dallas CISO Summit on the topic of Cyber-Risk Reporting for the Board. Evanta’s boardroom ...