Cyber risk management continues to grow more difficult

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

12/06/18

It's time for a new cyber risk management model

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

11/28/18

Best-of-breed security products still dominate -- kind of

Best-of-breed security products still dominate -- kind of

CISOs want products that can prevent, detect, and respond to cyber attacks, but they also consider product consolidation and integration.

11/16/18

8 features a cybersecurity technology platform must have

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

11/09/18

Cybersecurity professional impressions on cloud-native security

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

10/31/18

6 takeaways from McAfee MPower

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

10/26/18

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

10/19/18

Splunk lays out its cybersecurity vision

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

10/05/18

Cloudy future for security analytics

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

10/01/18

Form factor wars: Cloud-based or on-premises security technologies?

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

09/26/18

5 biggest cybersecurity challenges at smaller organizations

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

09/19/18

CISOs recommend future actions for their organizations

CISOs recommend future actions for their organizations

More security goals for the business, formal security processes, and increased training top the list of recommendations from chief information security officers.

09/05/18

The most important attributes of a cybersecurity platform

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

08/29/18

The transition toward enterprise-class cybersecurity vendors

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

08/24/18

What are small organizations doing about cybersecurity?

What are small organizations doing about cybersecurity?

Firms with 50 to 499 employees are spending more money, purchasing security product suites, and outsourcing security tasks to MSSPs.

08/21/18

The state of cybersecurity at small organizations

The state of cybersecurity at small organizations

Small and midsize businesses (SMBs) are being compromised due to human error, ignorance, and apathy.

08/16/18

Take-aways from Black Hat USA 2018

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

08/13/18

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco's acquisition of Duo Security opens many new IAM and cloud security opportunities for Cisco, but additional work remains.

08/06/18

Anticipating Black Hat USA 2018

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

08/02/18

Google intends to make GCP the most secure cloud platform

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

07/30/18

Load More