BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

Identity governance and administration, or IGA, has suddenly become a front-burner matter at many enterprises. Related: Identity governance issues in the age of digital transformation This is, in large part, because the complexity of business networks … Continue reading BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

One way to grasp how digital transformation directly impacts the daily operations of any organization – right at this moment —  is to examine the company’s application environment. Related: How new exposures being created by API … Continue reading NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

Cloud computing 101: basic types and business advantages of cloud-delivered services

If you are looking for a simpler method of managing issues such as storage, software, servers and database, cloud computing could have the answers that your business needs. The cloud is becoming increasingly popular around the world, as organisations a… Continue reading Cloud computing 101: basic types and business advantages of cloud-delivered services

Web application exposures continue to bedevil companies as digital transformation accelerates

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber spies feast on government shutdown Companies are scaling up their use o… Continue reading Web application exposures continue to bedevil companies as digital transformation accelerates

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper … Continue reading NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information we share with them. But that level of trust goes much deep… Continue reading MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through an HVAC contractor’s compromised account. C-suite execs across the land sudden… Continue reading NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

It’s hard to believe this month marks the 20th anniversary of the release of the devastating Melissa email virus which spread around the globe in March 1999. Related: The ‘Golden Age’ of cyber espionage is upon us Melissa was hidden i… Continue reading NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

A common thread runs through the cyber attacks that continue to defeat the best layered defenses money can buy. Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged net… Continue reading MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Related: Why we’re in the Golden Age of cyber espionage Enterprises have dumped small fortunes into stocking their SOCs (s… Continue reading Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection