5 critical questions to test your ransomware preparedness

I’m a pentester – that is, a professional penetration tester. Some call me an ethical hacker, a white hat, or red teamer. In the heat of the moment, I’ve been called much worse – because I’ve spent countless hours attacking organizations like yours wit… Continue reading 5 critical questions to test your ransomware preparedness

Perimeter intrusion detection systems market to reach $21.3 billion by 2026

The global market for perimeter intrusion detection systems estimated at $11 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2026, growing at a CAGR of 11.9% over the analysis period, according to ResearchAndMarkets. … Continue reading Perimeter intrusion detection systems market to reach $21.3 billion by 2026

Perimeter intrusion detection systems market to reach $5.98 billion by 2026

The global perimeter intrusion detection systems market is expected to witness an incremental growth of $5.98 billion between 2021 and 2026. Technavio expects the growth to accelerate at a CAGR of 9.2% during the forecast period and the market will obs… Continue reading Perimeter intrusion detection systems market to reach $5.98 billion by 2026

The seven themes driving the future of cybersecurity

Team8 announced the release of a report which details the seven themes shaping the future of cybersecurity. These themes are driven by the impact of the pandemic, the increase in remote work, and the rising number of cyberattacks, which are causing gov… Continue reading The seven themes driving the future of cybersecurity

Ransomware attack levels soaring, now accounting for 69% of all attacks involving malware

Ransomware attacks have reached ‘stratospheric’ levels in Q2 2021, now accounting for 69% of all attacks involving malware. That is among the most disturbing finding in the latest report from Positive Technologies. The research also reveals that the vo… Continue reading Ransomware attack levels soaring, now accounting for 69% of all attacks involving malware

The Network is Key to Securing the Everywhere Perimeter

In light of surging ransomware cases and recent high-profile cyberattacks like those on SolarWinds, Colonial Pipeline, and meat supplier JBS, enterprise security teams may fall into the trap of thinking, “more defenses are better.” They implement an a… Continue reading The Network is Key to Securing the Everywhere Perimeter

Remote Work Lessons Learned

To say that the world was unprepared for what happened in March of 2020 would be a gross understatement. Nobody needs a reminder of the seismic changes that the coronavirus pandemic introduced. Large enterprises were caught off guard, to be sure. But … Continue reading Remote Work Lessons Learned

Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is changing – the new perimeter follows your distributed users and their dev… Continue reading Transitioning to a SASE architecture

Have we put too much emphasis on protecting the network?

Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, the industry has focused on conditional access (i.e., identity as the new per… Continue reading Have we put too much emphasis on protecting the network?

Protecting productivity within the disappearing perimeter

During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work. A study by Mercer revealed 94% of employers agreed that pro… Continue reading Protecting productivity within the disappearing perimeter