The Future of CyberSecurity is Prevention
Zero Trust has become so prevalent that it has lost some of its stopping power
read more Continue reading The Future of CyberSecurity is Prevention
Collaborate Disseminate
Zero Trust has become so prevalent that it has lost some of its stopping power
read more Continue reading The Future of CyberSecurity is Prevention
Onions are great for analogies, as are buckets full of stuff from the beach. In this piece, I’d like to take a look at how both of these analogies can help us understand how bot and fraud mitigation can work together to help enterprises both improve th… Continue reading How Bot and Fraud Mitigation Can Work Together to Reduce Risk
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once
read more Continue reading The Secret to Automation? Eat the Elephant in Chunks.
The benefits of ZTNA make it hard to ignore
Ensuring that the right people have access to the proper resources when they need them whilst maintaining security and access controls across multiple data centers and cloud environments is one of the biggest… Continue reading The Ever-Increasing Issue of Cyber Threats – and the Zero Trust Answer
Smart City network infrastructure demands a proactive approach to find vulnerabilities before hackers find them
read more Continue reading Securing Smart Cities from the Ground Up
What questions should enterprise fraud teams ask when looking to better detect and mitigate fraud?
In early April, 1912, many people believed that the Titanic was unsinkable. On April 15, 1912, the Titanic sank and by late April, 1912, as the new… Continue reading What the Titanic Can Teach Us About Fraud?
The last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before settling at an equilibrium, somewhere in the middle. Think about it from an IT and security perspective.
read more
… Continue reading The Pendulum Effect and Security Automation
Keep your response up to speed as attackers get faster
read more
Continue reading As Cybercriminals Recycle Ransomware, They’re Getting Faster
On February 24, Russia launched its full-scale assault on Ukraine. The invader’s weapons included tanks, heavy artillery… and software. On April 8, attackers armed with Industroyer2, a species of malware designed to incapacitate power stations and plun… Continue reading Is an Infrastructure War on the Horizon?
In the last couple of years, events were taken online, moved to virtual forums and conducted using social platforms via video set-up. Events became simpler to attend, but the individual component of the experience was missing – we all wanted to mix wit… Continue reading RSAC22 and Infosecurity Europe, Three Weeks, Two Events