Advertise

Advertise

The Secure Access Paradigm Shift to Zero Trust

The basic principles of securing access to critical information have not changed, but the ecosystem your information resides in has transformed significantly. Changes in business and IT operations have introduced unnecessary complexity and risk to modern enterprise. However, the time has come for organizations to change their approach to security, or risk facing the consequences…

Ponemon offers best practices for threat intelligence

In February 2019, the Ponemon Institute conducted its The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies. Following is an excerpt from that extensive study, sponsored by Anomali. The importance of threat intelligence as part of an IT security mission should encourage organizations to take steps to improve how it…

Fundamentals for Reducing Your Attack Surface

A good boxer knows not to expose his body to his opponent. The art of his victory comes from his ability to avoid and withstand what his rival throws at him. For organizations today, reducing their attack surface inherently minimizes what an adversary can attack and their ability to strike.   The basic principles of…

A Focused Approach to Zero Trust

The evolution of IT has greatly outpaced that of cybersecurity. While security hasn’t stood still, it hasn’t progressed effectively to address today’s digital and gig economy realities. Here are some reasons why this is so. IT is distributed, hybrid and on-demand, broadening the scope of your attack surface. The workforce, like today’s data, is mobile, and…

Nearly half of firms suffer a data breach at the hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire wanted to know how seriously firms take the risks associated with third-party vendors, and their vendors’ vendors. Earlier this year, eSentire commissioned Spiceworks to…

Uncomfortable Truth #1 about Phishing Defense

Part 1 of a 5-part series.    The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks.   Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee…

What is a Threat Intelligence Platform?

Threat actors are constantly evolving and advancing their attacks. Organizations seek to gain context on these attacks by leveraging threat intelligence, which is actionable information about adversaries and their Tactics, Techniques, and Procedures (TTPs). A threat intelligence platform (TIP) is a solution that automates the machine labor of threat intelligence, reduces time to detection, and…

Information Technology: Leading the way

Increased demandSEEK Australia recently revealed the top 20 highest paying industries in Australia with Information Technology topping the leader board at number one. Kendra Banks, Managing Director at SEEK ANZ said: “What we are seeing is that candidates in information and communication technology are more motivated by salary and compensation than those in any other…

How important are soft skills in analytics

The field of data science is vast, and data scientists are expected to be skilled in a range of areas such as machine learning, data visualisation and data mining; at times, it can feel like you are only scratching the surface. It’s impossible to master all the tools and software available, but it’s important to…

Seven Steps to Secure Privileged Access

Gartner released the first-ever Magic Quadrant for Privileged Access Management,1 shining a spotlight on what may be the largest security vulnerability enterprises face today. Privileged accounts, credentials and secrets are “the keys to the kingdom” and they exist everywhere —on-premises, in the cloud, across DevOps environments and on endpoints. Attackers know this, which is why a…

Next post in Advertise