Embracing the cloud and meeting its security demands

If you want to build a career in information security, there’s no shortage of diverse roles you can aim for. Whether you’ll end up doing that or something else will depend on your specific abilities and preferences, which may ultimately ste… Continue reading Embracing the cloud and meeting its security demands

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

IT departments tend to be concerned primarily with cybersecurity attacks that originate from outside the enterprise, known as a “north-south” attacks. This often leaves them more vulnerable to even more dangerous attackers who use phishing, malware or … Continue reading Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security orchestration and automation checklist: How to choose the right vendor

Faced up against the well-chronicled global skills shortage, the ceaseless bombardment of security alerts and the hodgepodge of security tools unable to communicate with each other, security operations professionals likely feel as if the deck is stacke… Continue reading Security orchestration and automation checklist: How to choose the right vendor

DNS security is no longer optional

Several high-profile DNS security incidents have made headlines recently, a reminder that this integral part of the internet must not be taken for granted. Unlike enterprise assets – endpoints, networks, data centers – DNS is public infrast… Continue reading DNS security is no longer optional

Five examples of user-centered bank fraud

In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most banking platforms were not designed securely and hackers have been taking advanta… Continue reading Five examples of user-centered bank fraud

Research shows that devices banned by US government lack basic security practices

As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in operation shines a spotlight on both the severity of the issue and the dire need … Continue reading Research shows that devices banned by US government lack basic security practices

Passion, ingenuity and hard work: The cybersecurity startup story of Israel

According to Start-Up Nation Central (SNC), there are currently 400 cybersecurity start-ups operating in Israel. In 2018, they raised over $1.2 billion in 96 rounds of funding. That is more money raised than any other vertical market in the Israeli eco… Continue reading Passion, ingenuity and hard work: The cybersecurity startup story of Israel

Microsoft is right, mandatory password changes are obsolete

Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last couple of decades, and against most compliance directives including some of t… Continue reading Microsoft is right, mandatory password changes are obsolete

Solving security problems: Security advice for those with limited resources

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security practices, sets out priorities for a successful data security plan, and opines … Continue reading Solving security problems: Security advice for those with limited resources

Orchestrating security policies across your hybrid cloud with intelligent data virtualization

The proliferation of data is causing a security and governance challenge across the hybrid cloud. Estimates project the global datasphere will grow from 33 zettabytes in 2018 to 175 by 2025. As new, data-intensive systems are spun up to keep pace with … Continue reading Orchestrating security policies across your hybrid cloud with intelligent data virtualization