Networks are constantly evolving - and so are their attack surfaces. IT security pros must now contend with digital assets like cloud platforms, application containers, web applications, IoT devices, and industrial control systems. For those in critical infrastructure industries, the stakes are even...
In this report we analyze real-world end-user vulnerability assessment (VA) behavior using a machine learning (ML)
algorithm to identify four distinct strategies, or "styles." These are based on five VA key performance indicators (KPIs)
which correlate to VA maturity characteristics.
This study specifically focuses...
As the modern attack surface rapidly expands, companies must get the basics right. Yet each time a data security breach hits the news, there are reactionary questions are what could have been done to avoid the problem. More often than not these incidents occur because organizations commonly overlook basic security...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. In fact,
the perimeter has mostly disappeared. We are living in a new reality, one crowded with new types of dynamic IT assets.
it's discovering short-lived assets like containers, assessing the state of cloud...
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
Many of the devices that go into so-called smart cities and buildings are not built to be secure, making it difficult for security operations centers to manage risk, warns Sarb Sembhi, CTO and CISO of Virtually Informed, who describes what needs to change.
If you're dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you're probably considering some form of software-defined wide area networking
With the variety of constraints that you face, selecting the right SD-WAN solution for...
The traditional WAN is no longer an effective solution for today's
distributed enterprise. Organizations are overcoming significant
security and network issues by moving to SD-WAN. There are
many different SD-WANs on the market today, and IT professionals should
carefully review their options so they are not...
Most organizations are undergoing some form of digital transformation (DX), transforming how they bring products and services to the market - and deliver value to their customers. But DX initiatives bring complexity for network operations teams. With business-critical services distributed across multiple clouds, this...
Over the last five years, cybercrime occurrences have escalated dramatically, taking hold of organizations
worldwide - affecting revenue, productivity, information security, and reputation. In 2017 Cost of
Cybercrime Study, the Ponemon Institute emphasizes that, on average, organizations have paid
$11.7 million USD...
Many companies have automated some of their security
procedures, but they are even further behind with other
security best practices.
Big chunks of infrastructure remain vulnerable in the
typical organization, with 25% of the infrastructure not
adequately protected at the typical organisation.
We know that cybercriminals and even nation-states are taking advantage of the clues we leave behind in our digital footprints. How can investigators and researchers take advantage of this same open source intelligence? Former RAF investigator John Walker discusses the perils and promise of OSINT.
As internal communication becomes a top priority for companies as departments are no longer acting in silos, companies must look for new ways to drive internal efficiencies and improve workflows for their staff. Companies are moving past email to various unified comunication platforms, allowing staff to communicate on...
Implementing an end-to-end privileged access management solution should follow a defined process to
minimize costs and distractions, and speed results.
Throughout the process of selecting and deploying your privileged access management solution, keep in
mind these business requirements, as they will help you sell...
In the wake of a breach at Hong Kong's Cathay Pacific airlines that involved unauthorized access to personal details on 9.4 million passengers, security experts are weighing in on factors that might have contributed to the incident. So far, the airline has provided only sketchy details.