visibility
The Exploding Enterprise Attack Surface
When Jerry and David’s Guide to the World Wide Web was launched in 1994, there were roughly 2,500 websites in the directory (including the very first website, created by Tim Berners-Lee at ...
The Evolution of Threat Hunting
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
Cloud Security Threats: Escaping the Egregious Eleven – Part Two
Depending on your familiarity with the Cloud Security Alliance (CSA) publications, part one of this blog was intended as either an introduction or a nagging reminder of the ‘Egregious Eleven’ security threats ...
An open conversation about cyber-risk reporting to the BOD
A few days ago, I had the privilege of moderating a boardroom discussion of CISOs at the Evanta Dallas CISO Summit on the topic of Cyber-Risk Reporting for the Board. Evanta’s boardroom ...
Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition
How many times has a vendor released a critical cybersecurity patch for an operating system that is in “end of life” (EOL), or the lifecycle period where the vendor no longer issues ...
50 Shades of Gray in Cybersecurity
Nearly 90% of data breaches happen because of poor cybersecurity posture. Unfortunately, a strong cybersecurity posture is not necessarily a function of dollars invested or the number of tools deployed. Organizations struggle ...
Solving Cloud Security Complexity With Visibility, Automation
Ensuring cloud security in multicloud and hybrid IT environments can be a difficult task There are two sides to every coin, as the old saying goes. It’s certainly the case with the ...
You Can’t Protect What You Can’t See
I assume—or at least hope—that it won’t come as a surprise to you that effective cybersecurity is challenging. I mean, if it were easy, we would have found a better solution by ...
Help, I Have Moved to Containers and Now I’m Blind
Containers and microservices are becoming a very popular option for deploying applications. There are many benefits of containers, faster deployments, reproducibility of environments, cost optimizations, isolation, and flexibility in general. There is ...
