As Data Security and Privacy Regulations Tighten, Governance Solutions Are Growing

Audit, compliance, and governance solutions are growing at a rapid pace as part of the Identity Access Management (IAM) market, which is anticipated to grow at a CAGR of over 17% by 2024, according to a report by Grandview Research. The growing concern among organizations regarding data thefts of critical customer information is a major […]

Read More

Cybersecurity Insights from CDW: What Enterprise CISOs Need to Know About Internal Threats

Recently, CDW released a comprehensive, thought-provoking compilation of insights on cybersecurity, compiled and summarized by Sadik Al-Abdulla. We highly recommend spending time with this report, which is over 100 pages long, and shares the vision of several highly respected cybersecurity companies. “We have reached a tipping point when it comes to the volume and dynamics […]

Read More

There Is No True Cloud Security Without Comprehensive Command and Control

The most recent survey conducted by the SANS Institute (News – Alert) starts off by summarizing stunning breaches associated with sensitive data exposure based on misconfigured Amazon Simple Storage Service (S3) instances including a Verizon (News – Alert) partner who leaked the personal information of more than 14 million Verizon customers, voter data associated with the Republican party revealing private data of nearly 200 million […]

Read More

How Edge Computing Will Drive New Demands for Data Security, Infrastructure Integrity and New IT Policies

With the explosive growth of Internet of Things (IoT) devices and the related massive data produced at the edge of the network, the centralized cloud computing model is running up against limitations associated with bandwidth, computing resources, and the latency often associated when processing is done in the cloud instead of locally. Innovation and the […]

Read More

The Increasing Attack Surface in 2019

The “attack surface” is simply the total digital resources that are exposed to threats across the enterprise, and that attack surface is growing faster than ever before. In 2018, we saw a new level of criminal creativity in the way of adversarial AI algorithms, designed to do everything from creating a video of a former […]

Read More

In a Multi-Cloud World, It’s Time to Rethink Who Has Access To What

The biggest challenge in today’s multi-cloud world is not storing data or supporting applications, but securing that data all along the “digital supply chain.” Given the economics of the cloud, and the sense it makes to use different kinds of clouds for different applications, arguments to leverage cloud today are rock solid. With weak security […]

Read More

The First Major Breach Of 2019 And What This Australian Story Teachs US

The first data breach this year happened January 1, when the private data of 30,000 Australian civil servants was stolen in an email phishing attack. The incident occurred when a directory was downloaded by an unauthorized third party after a government employee received a phishing email, and while no financial information was compromised, the stolen […]

Read More

Why Are Internal Threats Increasing? Five Questions to Ask…

A report published by Cyber-Security Insiders revealed eye-opening responses from CSOs, CIOs and other executives in global enterprises. In summary, their research (commissioned by CA Technologies) uncovered these five facts: Ninety percent of organizations feel vulnerable to insider attacks. The main enabling risk factors include too many users with excessive access privileges (37%), an increasing […]

Read More

Scalable Security for IoT Deployments: Privileged and Permissioned

IoT and Industrial IoT present the greatest network, data and application security challenges in recent history. In fact, some experts believe that the business potential for the connected world is being held back due to security concerns, and rightfully so. What’s holding IT, OT and network operations teams from large implementations, whether smart buildings or […]

Read More

Don’t Get Held Hostage: Innovations Address Ransomware

Ransomware is a troubling trend in the world of enterprise security. When a computer in an enterprise is “infected” with ransomware, it automatically and persistently tries to jump other computers and propagate through the network. One employee (out of thousands) can accidentally (or intentionally) install a ransomware, and until now, it has been almost impossible […]

Read More