Taking Steps Toward an Impactful SASE Architecture

Given the complexity of digitization initiatives for most companies over the last decade, the world has grown acutely aware of how crucial good cybersecurity is for business health. More than ever before, this past year demonstrated that predicting th… Continue reading Taking Steps Toward an Impactful SASE Architecture

Online Ed is the New Corporate Threat Vector

Schools became a major hotspot for cyberattacks as students moved to online learning. In the last 30 days, education was the most targeted sector, receiving more than 60% of all malware encounters, or more than 5 million incidents, according to Micros… Continue reading Online Ed is the New Corporate Threat Vector

Three Wishes to Revitalize SIEM and Your SOC

How many times have you hoped that a magic genie would somehow appear and grant three wishes? If the wishes were for your SIEM or security operations team, what would that be (and what kind of security certifications would you require of your genie)? … Continue reading Three Wishes to Revitalize SIEM and Your SOC

Three Wishes to Revitalize SIEM and Your SOC

How many times have you hoped that a magic genie would somehow appear and grant three wishes? If the wishes were for your SIEM or security operations team, what would that be (and what kind of security certifications would you require of your genie)? … Continue reading Three Wishes to Revitalize SIEM and Your SOC

Securing Remote Health Care Post-COVID-19

The global pandemic has accelerated technology trends across several industries, and health care is no exception. As social distancing increases, telehealth and remote patient monitoring are becoming increasingly common. According to the CDC, teleheal… Continue reading Securing Remote Health Care Post-COVID-19

Salesforce DevSecOps: Avoiding Arrested Development

Salesforce is a feature-rich SaaS platform designed for custom development and user modification. Its business power is driven by the ease of customization from both AppExchange downloads and its massive developer ecosystem. However, when Salesforce i… Continue reading Salesforce DevSecOps: Avoiding Arrested Development

Identity Management Day: Cybercriminals No Longer Hack in, They Log In

Identity Management Day is a way to educate about the importance of securing identity and access credentials When the police arrive at the scene of a break-in, one of the first things they’ll do is isolate the crime scene and assess its condition. The… Continue reading Identity Management Day: Cybercriminals No Longer Hack in, They Log In

Visibility, Context, Automation are Key to Security Control

Remote work is now ingrained into the fabric of how companies operate. Many have already realized this new working paradigm optimizes productivity. So much so, that an ever-growing list of companies – Salesforce, Facebook, Dropbox and more – have conv… Continue reading Visibility, Context, Automation are Key to Security Control

Secrets Detection: An Emerging AppSec Category

Applications are no longer standalone monoliths, they now rely on thousands of independent building blocks: cloud infrastructure, databases, SaaS components such as Stripe, Slack and HubSpot, just to name a few. This is a significant shift in software… Continue reading Secrets Detection: An Emerging AppSec Category

Breach Clarity Data Breach Report: Week of April 5

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Data Breach Report: Week of April 5