Advertise

Advertise

What are the Odds? How Vulnerable are You to the Latest Vulnerabilities?

Cybersecurity vulnerability management is a continuous race against time that is being compounded by the proliferation of new devices and applications within organizations. Between 2015 and 2019, data from exploit-db reveals that the number of distinct products with reported vulnerabilities increased by 150 percent. Over this same period, the weaponization time for the creation of…

VPN Complexity Cripples Innovation

Long gone are the days when switchboard operators were relied upon to make phone connections. Advancements in telecommunication quickly eliminated the need for cumbersome and manual intervention. It is time we abandon the switchboard-like model that we have inherited from virtual private networks (VPNs), remove unnecessary complexity, and make room for security innovation.    Policy…

Break Up With Your Insecure VPN

The inconsistent connections and the constant feeling of insecurity cannot be forgiven or forgotten— it is time to move on and break up with your VPN. In the 90s, the VPN was all the rage in cybersecurity. The creation of the ability for a private connection on the internet between a multitude of users and…

Sharing is Caring—and Smart

If your organization is involved in critical infrastructure such as public utilities, finance, healthcare, national defense, technology, or a similar field, nation-state attackers have put a huge target on your network. Considering the sophistication and ongoing nature of attacks against your networks, it’s important to secure your infrastructure. A 1998 executive order designed to protect…

Kill the VPN. Move to Zero Trust

We’re a modern workforce, working anywhere and everywhere. The days of a fixed and easily identifiable perimeter are long gone, meaning depending on traditional VPNs is no longer an effective or secure means for remote access. In fact, it’s dangerous. Today’s network landscape is complex and elusive with distributed applications, people, and data. Our expanding…

Patch Before Perish

Cybersecurity vulnerability management is a continuous race against time compounded by device and application proliferation across cloud, IoT and mobile workers. This expanding attack surface increases pressure on resource-constrained security teams to patch before possible exploitation. Scanning platforms have improved, but comprehensive vulnerability management solutions still lack timely patch management capabilities. In a recent Ponemon…

The Secure Access Paradigm Shift to Zero Trust

The basic principles of securing access to critical information have not changed, but the ecosystem your information resides in has transformed significantly. Changes in business and IT operations have introduced unnecessary complexity and risk to modern enterprise. However, the time has come for organizations to change their approach to security, or risk facing the consequences…

Ponemon Offers Best Practices for Threat Intelligence

In February 2019, the Ponemon Institute conducted its The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies. Following is an excerpt from that extensive study, sponsored by Anomali. The importance of threat intelligence as part of an IT security mission should encourage organizations to take steps to improve how it…

Fundamentals for Reducing Your Attack Surface

A good boxer knows not to expose his body to his opponent. The art of his victory comes from his ability to avoid and withstand what his rival throws at him. For organizations today, reducing their attack surface inherently minimizes what an adversary can attack and their ability to strike.   The basic principles of…

A Focused Approach to Zero Trust

The evolution of IT has greatly outpaced that of cybersecurity. While security hasn’t stood still, it hasn’t progressed effectively to address today’s digital and gig economy realities. Here are some reasons why this is so. IT is distributed, hybrid and on-demand, broadening the scope of your attack surface. The workforce, like today’s data, is mobile, and…

Next post in Advertise