The Exploding Enterprise Attack Surface

The Exploding Enterprise Attack Surface

| | Cybersecurity, visibility
When Jerry and David’s Guide to the World Wide Web was launched in 1994, there were roughly 2,500 websites in the directory (including the very first website, created by Tim Berners-Lee at ...
The Evolution of Threat Hunting

The Evolution of Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...

Cloud Security Threats: Escaping the Egregious Eleven – Part Two

Depending on your familiarity with the Cloud Security Alliance (CSA) publications, part one of this blog was intended as either an introduction or a nagging reminder of the ‘Egregious Eleven’ security threats ...
An open conversation about cyber-risk reporting to the BOD

An open conversation about cyber-risk reporting to the BOD

A few days ago, I had the privilege of moderating a boardroom discussion of CISOs at the Evanta Dallas CISO Summit on the topic of Cyber-Risk Reporting for the Board. Evanta’s boardroom ...

Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition

How many times has a vendor released a critical cybersecurity patch for an operating system that is in “end of life” (EOL), or the lifecycle period where the vendor no longer issues ...
50 Shades of Gray in Cybersecurity

50 Shades of Gray in Cybersecurity

Nearly 90% of data breaches happen because of poor cybersecurity posture. Unfortunately, a strong cybersecurity posture is not necessarily a function of dollars invested or the number of tools deployed. Organizations struggle ...
vendor access management

Solving Cloud Security Complexity With Visibility, Automation

Ensuring cloud security in multicloud and hybrid IT environments can be a difficult task There are two sides to every coin, as the old saying goes. It’s certainly the case with the ...
Security Boulevard

You Can’t Protect What You Can’t See

I assume—or at least hope—that it won’t come as a surprise to you that effective cybersecurity is challenging. I mean, if it were easy, we would have found a better solution by ...
Visibility as a Service Webinar

Help, I Have Moved to Containers and Now I’m Blind

Containers and microservices are becoming a very popular option for deploying applications. There are many benefits of containers, faster deployments, reproducibility of environments, cost optimizations, isolation, and flexibility in general. There is ...
Loading...