Analyses

binary chains / linked data / security / blockchain
sony pictures movie

digital security concept > lock / keyhole / circuits / network connections

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

chain links securing multiple transactions / big data / security / blockchain

CISOs recommend future actions for their organizations

More security goals for the business, formal security processes, and increased training top the list of recommendations from chief information security officers.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

digital security concept > lock / keyhole / circuits / network connections

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

1 small business security

What are small organizations doing about cybersecurity?

Firms with 50 to 499 employees are spending more money, purchasing security product suites, and outsourcing security tasks to MSSPs.

red padlock cybersecurity threat ransomeware

The state of cybersecurity at small organizations

Small and midsize businesses (SMBs) are being compromised due to human error, ignorance, and apathy.

20161101 cisco logo sign with clouds at partner summit 2016

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco's acquisition of Duo Security opens many new IAM and cloud security opportunities for Cisco, but additional work remains.

security risk - phishing / malware / social engineering

8 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

endpoint protection gears

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

containers port ship boat

Containers are here. What about container security?

ESG data indicates that cybersecurity pros have problems around the nuances of container technology and implementing container-centric security controls.

futuristic security interface

The evolution of security operations, automation and orchestration

Basic functionality of SOAR products is being supplemented with strong integration, canned runbooks, and case management.

cloud computing - public, private; open, locked

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

Load More