Week Two Featuring Research From Forrester: What Happens When Application Security Becomes Continuous?

How secure are the software applications within your organization? Think about it. Were they fully secure a month ago?…
The post Week Two Featuring Research From Forrester: What Happens When Application Security Becomes Continuous? appeared first… Continue reading Week Two Featuring Research From Forrester: What Happens When Application Security Becomes Continuous?

Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security

Forrester recently analyzed the current application security landscape, along with the program plans of global organizations…
The post Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security … Continue reading Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security

Forrester: Keeping Smart Cities Safe From Hacks

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more. Continue reading Forrester: Keeping Smart Cities Safe From Hacks

The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution

The goal of a strong unified endpoint management (UEM) platform is unifying and modernizing management, enhancing security and providing a positive end-user experience.

The post The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution appeared first on Security Intelligence.

Continue reading The Forrester Wave: Unified Endpoint Management, Q4 2019 — UEM Evolution

Myths About Zero Trust Exposed

Here are five myths about the Zero Trust security strategy that could be hindering wider adoption In a highly digitized world, the stakes behind committing a cybercrime have never been higher, with global spending greater than $124 billion on IT produ… Continue reading Myths About Zero Trust Exposed

Why are cyber insurers incentivizing clients to invest in specific vendors?

The cyber insurance industry is taking baby steps away from a long and messy infancy. For the hundreds of companies that offer policies, toddlerhood is here, and it means exerting more influence over how clients protect their networks and information. For years, headlines have fixated on how big firms like AIG and Zurich have been locked in legal disputes over specific claims, but insurers are now trying to be more proactive with customers. The smartest approach for everyone, they say, is to prevent breaches from happening in the first place. Key to that, and saving money, is trying to identify the products that are most effective. Marsh, the global insurance broker and risk adviser, last month published its first list of Cyber Catalyst-designated products, a tag given to 17 services that a group of insurance firms say its clients should consider, including offerings like FireEye’s Endpoint tool and CrowdStrike penetration testing service. Insurers for years have assessed security products, […]

The post Why are cyber insurers incentivizing clients to invest in specific vendors? appeared first on CyberScoop.

Continue reading Why are cyber insurers incentivizing clients to invest in specific vendors?

How much of the cybersecurity talent shortage is self-inflicted?

Money matters when it comes to recruiting cybersecurity staffers. But, beyond salary, a combination of factors have contributed to the widespread skills shortage, and some issues are worsened by the industry itself. Various studies suggest the shortage of qualified cybersecurity candidates is set to hit 3.4 million unfilled positions by 2021, up from the current level of 2.93 million, with 500,000 of those empty seats located in the U.S. It’s the kind of existential problem that makes other headaches worse, resulting in possible data breaches not being investigated and the rise of untested security vendors hawking artificial intelligence tools that promise to help corporate security teams run with fewer humans. And yet, while enterprise executives and recruiters agree there is a significant dearth of skilled security professionals, there is a surge of momentum behind the argument that the industry’s staffing shortage is self-inflicted. The lack of qualified job candidates isn’t […]

The post How much of the cybersecurity talent shortage is self-inflicted? appeared first on CyberScoop.

Continue reading How much of the cybersecurity talent shortage is self-inflicted?

3 Barriers to Identity and Access Management (IAM) Modernization

Reading Time: 3 minutes Organizations of all sizes are struggling to modernize their identity and access management programs due to incomplete IAM strategies, poor alignment with the business, legacy systems and more.

The post 3 Barriers to Identity and Access Management (IAM) Modernization appeared first on Security Intelligence.

Continue reading 3 Barriers to Identity and Access Management (IAM) Modernization

3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

Reading Time: 3 minutes Network vulnerabilities can be found in the most unlikely places. That’s why companies should adopt zero trust security principles, even if they lack the resources to rebuild the network from scratch.

The post 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network appeared first on Security Intelligence.

Continue reading 3 Ways to Adopt Zero Trust Security Without Rebuilding Your Network

The Forrester Wave: Unified Endpoint Management, Q4 2018 — New Acronyms, New Leaders and How Device Management Has Evolved

IBM was named a leader in the “2018 Forrester Wave: Unified Endpoint Management, Q4 2018” report, and MaaS360 earned recognition as the best current offering in the marketplace.

The post The Forrester Wave: Unified Endpoint Management, Q4 2018 — New Acronyms, New Leaders and How Device Management Has Evolved appeared first on Security Intelligence.

Continue reading The Forrester Wave: Unified Endpoint Management, Q4 2018 — New Acronyms, New Leaders and How Device Management Has Evolved