Opinions

old car in need of repair with binary numbers in background

Why data loss prevention is a throwback technology

Times are changing, and traditional cybersecurity tools are no longer enough to protect an organization’s assets.

team of hackers / organized attack / group of threat actors

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The...

fearful woman covers her face with her hands / afraid / distressed

Why security pros are addicted to FUD and what you can do about it

Despite professing anti-FUD rhetoric, cyber experts fan the flames, breathlessly sharing the details of the latest data breaches. It's a risky addiction that can lead to security apathy in enterprises. Here's how to harness it.

threat detection

EDR is dead! Long live XDR!

Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

1 threat intro

Can an organization’s biggest assets also be their biggest threats?

Accidental misuse can be one of the most overlooked causes of insider threats today, putting every business function at risk.

IoT / Internet of Things / wireless network devices / mapping connections

Securing IoT devices: Fortinet's FortiNAC automates the process

Fortinet’s network access control solution, FortiNAC, automatically discovers, controls, and enforces Internet of Things (IoT) endpoints.

trouble ahead 166144370

How do we build digitally resilient organizations?

As we head towards a digitally dependent future, the need for digital resilience has never been greater. Defining digital resilience and describing the need was the first step, but how do we build organizational capability?

orange monitors with lock icon network security cyber threat

The thin host to serverless model is radically realigning your security responsibilities

This is good news as infrastructure and network security oversight transfers to your cloud provider.

shadowy attacker hooded

Attacker attribution is hard, but sometimes easier than you think

Attribution of an attacker, and uncovering his or her true identity, remains a vexing problem for incident response teams. But in certain cases, it can be solved. Advanced telemetry and geofencing technologies offer the potential to...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Improving access certification processes makes life easier for business users. But that’s not the point

When you do everything possible to make access certifications easier, you’re not just doing business users a favor. You’re improving the security posture of the entire organization.

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

creepy teacher chalkboard wolf

Complying with emerging privacy regulations: sometimes you need a silver cannonball

With GDPR compliance and other privacy regulations around the world in 2018, no small, simple solution exists.

Artificial intelligence and digital identity

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

9 screen locking device lock down authentication

The behavioral economics of authentication

Organizations can now implement authentication technologies that improve security and user experience. Consumers just need some nudging to follow along.

fact fiction debunk myths truth

5 hard truths every CISO should know

Security professionals ignore these truths at their own peril. The common theme across all five: Don't underestimate the risk of social engineering and poor patching policies.

Dinosaurs / Tyrannosaurus Rex / Jurassic / Prehistoric / Ancient / Old / Outdated / Binary

3 characters from Jurassic Park that could’ve benefited from an IT disaster recovery plan

Jurassic Park and IT disaster recovery — how do they connect? In fact, we can learn some pretty valuable IT-DR lessons from the characters of the movie franchise.

facial recognition access identification biotech

Why you shouldn’t use your face as your password

You can now use your face to lock your smartphone. But just because you can doesn’t mean you should.

1 intro security executive thinking woman face binary

Stop playing “whack-a-mole” with your security

Google does it, so can you. Stop dealing with IT security problems when they happen; start addressing the root cause.

power lines

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

password security - locked mobile phone in hand shows lockscreen

Does the answer to better security lie in password-less experiences?

Truly password-less authentication that lets users control personal details is key to avoid identity theft and data breaches.

Load More