GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

The cybersecurity talent shortage is here to stay. With an estimated 1.5-2 million unfulfilled cybersecurity positions, organizations are coming to terms with the fact that no amount of creative hiring initiatives will rid them of the need of figuring … Continue reading GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. The breach of some 30 computer… Continue reading GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

GUEST ESSAY: What your company should know about addressing Kubernetes security

Kubernetes is one of many key enabling technologies of digital transformation that has tended to remain obscure to non-technical company decision makers. Related podcast: Securing software containers Kubernetes is an administration console — an o… Continue reading GUEST ESSAY: What your company should know about addressing Kubernetes security

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom. This is because privileged accounts are widely deployed all across modern business networks — on-premi… Continue reading Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services … Continue reading Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. This is referred to as ‘dwell time’, and a recent report from the Ponemon Ins… Continue reading GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content

Facebook was lucky when the Information Commissioner’s Office (ICO)—the UK’s independent authority set up to uphold information rights in the public interest—hit the U.S. social media company with a £500,000 fine. Related: … Continue reading GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content

GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

Picture two castles. The first is impeccably built – state of the art, with impenetrable walls, a deep moat, and so many defenses that attacking it is akin to suicide. The second one isn’t quite as well-made. The walls are reasonably strong… Continue reading GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

NetSecOPEN names founding members, appoints inaugural board of directors

SAN JOSE, Calif. – Dec. 11, 2018 – NetSecOPEN, the first industry organization focused on the creation of open, transparent network security performance testing standards, today announced that 11 prominent security vendors, test solutions a… Continue reading NetSecOPEN names founding members, appoints inaugural board of directors

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at S… Continue reading GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance