Sponsor Content news, articles & updates| SC Media

Sponsor Content

How managed detection and response became a game changer

Gartner recently released its 2020 Market Guide for Managed Detection and Response (MDR) Services. Reading the fifth edition of this report reminds me of how far the industry has come and just how far it needs to go. I remember 2016 and working with Gartner analysts to champion a new category that better described what…

New DevSecOps study highlights need to address AppSec throughout the SDLC

Despite the best of intentions among security and development teams, finding common ground can be a real challenge. Both sides are driven by different—and often competing—metrics, making alignment even harder. Add the fact that most security teams lack an understanding of modern application development practices, including the move to microservices-driven architectures and the use of…

How to cybersecurity: Pain in the *AST

At the most fundamental level, IT security is about buying software, while application security is about building software. The core mission of both groups is bringing risk down to an acceptable level.

Why a cloud-native platform is a requirement for modern cybersecurity

If you ask a cybersecurity professional what they like about their job, odds are high that somewhere near the top of the list is: “Things are always changing.” It’s almost a cliché that cyberthreats are always evolving, but it remains true. Threat actors are inventive, and many have the skills and motivation to continually refine…

Cyber Criminals Targeting Remote Work to Gain Access to Enterprise Networks and Critical Data

Good threat intelligence can sift through mountains of data collected from sensors across the globe to provide insights into what is happening and what countermeasures need to be in place to defend against a dynamic threat environment. For example, Fortinet’s FortiGuard Labs just released its latest Global Threat Landscape Report covering the first half of…

Preparing for what’s next: Innovation also brings cybersecurity risk

Today’s CIOs have an unprecedented challenge on their hands. They are spearheading digital transformation efforts, creating revenue-generating applications, enabling remote work and driving seamless customer experiences. This new business environment also created a veritable playground for attackers, making it hard to strike the right balance between innovation and security. Most attacks today follow a similar…

In an increasingly complex world, AI is the only way forward

The technology environment in which businesses and society operate is becoming increasingly complex. Smart cities now rely on tools like AI to coordinate things like traffic, power, and emergency systems. Distributed manufacturing platforms use it to respond to consumer demand in near-real-time. Massive data centers depend on intelligent systems to process elephant flows of information…

COVID-19: You won’t get a pass on cybersecurity

The COVID-19 outbreak provides ripe opportunities for criminal actors to exploit fear, uncertainty, and companies ill prepared to to secure remote workers, driven to home offices by travel restrictions and social-distancing. The first threat comes in the form of misinformation and weaponized websites and documents. Websites and apps with outbreak maps are attracting unwitting victims…

Applying the 80/20 Rule to Cloud Security

The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work smarter, not harder.   How can we apply Pareto’s principle to cloud security? Within your security activities, what is the key 20 percent that will produce 80 percent of your results when it comes to reducing risk?  One effort that absolutely falls into the…

Next post in Sponsor Content