No More Paralysis by Analysis: How Security is Evolving to Real-Time Outcomes

A well-known CISO customer was recently telling me about his experience with implementing new security solutions. His consistent feeling? Dread – the security alerts and things that can suddenly break in the beginning can be overwhelming. &#… Continue reading No More Paralysis by Analysis: How Security is Evolving to Real-Time Outcomes

How to Strengthen Your Cyber Security DNA

Cyber security is a complex animal that requires many disciplines and a diverse toolkit. Typically, resources are limited, and incident response and security staff are overloaded with noise, irrelevant alerts and incomplete static information. &#1… Continue reading How to Strengthen Your Cyber Security DNA

We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

At the recent Gartner Security & Risk Management Summit, analysts presented their findings on the top technologies for information security and their implications for security organizations in 2018. At the event Neil MacDonald highlighted Top … Continue reading We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

Detection Only Solutions Aren’t Enough For Today’s Security Teams

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection only solutions aren’t enough. They need more practical app… Continue reading Detection Only Solutions Aren’t Enough For Today’s Security Teams

6 Tips for Securing Privileged Accounts in the Enterprise

Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers can easily obtain credentia… Continue reading 6 Tips for Securing Privileged Accounts in the Enterprise

Simplifying PCI DSS 3.2 Compliance with Preempt

If your organization handles credit cards, you are no doubt familiar with  Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to strengthen se… Continue reading Simplifying PCI DSS 3.2 Compliance with Preempt

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically changed and research has shown over and … Continue reading Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior