Reblaze Rolls Out Managed Reverse Proxy Security Service

Reblaze this week made generally available a managed cloud service, dubbed Curiefense, through which it provides a web application firewall, application programming interface (API) security, bot management, traffic control and distributed denial of se… Continue reading Reblaze Rolls Out Managed Reverse Proxy Security Service

Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave. Continue reading Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

What Security Data Do I Really Need to Collect and Analyze?

The post What Security Data Do I Really Need to Collect and Analyze? appeared first on Security Weekly. Continue reading What Security Data Do I Really Need to Collect and Analyze?

Zscaler Extends Security Services Reach

Zscaler has extended the reach of its security service to now include protection capabilities add cloud browser isolation along with cloud security posture management (CSPM) for software-as-a-service (SaaS) applications and a cloud access security bro… Continue reading Zscaler Extends Security Services Reach

MSS, EDR, MDR: What’s the Difference and Which Do You Need?

As cybersecurity threats grow more sophisticated, a combination of MSS, EDR and MDR can help organizations bring intelligence to their security posture The cybersecurity threat landscape is constantly evolving, with threats becoming more sophisticated… Continue reading MSS, EDR, MDR: What’s the Difference and Which Do You Need?

The Dramatically Changing Role of the CISO

When I first started covering data security in the 1990s, the relatively new CISO role was almost an entirely technical role. Even if CISOs didn’t do the work directly, they needed deep technical capabilities in networking and operating systems. And t… Continue reading The Dramatically Changing Role of the CISO

Partner Best Practices for Remote Incident Response and Assessment Service Delivery

In the past, Incident Responders and Security Analysts had to fly out to a network to help contain and investigate an incident on-site, or complete a Threat and Compromise Assessment. Even without coronavirus fears, this practice is becoming less and l… Continue reading Partner Best Practices for Remote Incident Response and Assessment Service Delivery