Juniper Extends Threat Intelligence Reach

Juniper Networks announced today it is extending the reach off the threat protection appliances it provides to include data from third-party sources using a set of custom data collectors. Amy James, director of security product marketing at Juniper Ne… Continue reading Juniper Extends Threat Intelligence Reach

5 Ways CISOs Can Improve Collaboration on Security Risks

While the CISO’s role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.

The post 5 Ways CISOs Can Improve Collaboration on Security Risks appeared first on Security Intelligence.

Continue reading 5 Ways CISOs Can Improve Collaboration on Security Risks

An Open Letter to Security Managers: Stop Trying to Do It All

Security managers and IT teams today often try to tackle everything in-house, even though they don’t always have the skills and resources to run an effective security program.

The post An Open Letter to Security Managers: Stop Trying to Do It All appeared first on Security Intelligence.

Continue reading An Open Letter to Security Managers: Stop Trying to Do It All

Chris Dale, Netsecurity – Paul’s Security Weekly #569

Chris Dale is the Head of the Penetration Testing & Incident Handling groups at Netsecurity, a mid-sized company based out of Norway. Along with significant security expertise, Chris has a background in System Development, IT-Operations and Securi… Continue reading Chris Dale, Netsecurity – Paul’s Security Weekly #569

BYOD: Are Thousands of Rogue Devices Lurking on Your Network?

While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here’s how to effectively manage rogue devices.

The post BYOD: Are Thousands of Rogue Devices Lurking on Your Network? appeared first on Security Intelligence.

Continue reading BYOD: Are Thousands of Rogue Devices Lurking on Your Network?

Zero Trust Security Model

With so many breaches occurring worldwide and so many organizations and consumers being impacted, IT admins are shifting their attention to a zero trust security model. This concept has been around for a few years, but as digital assets become increasi… Continue reading Zero Trust Security Model

What Are My Options? Session Encryption Protocols Looking Forward

TLSv1.3 is a game changer for some enterprises and data centers, what if I can?t switch to end-to-end and need a transition phase or alternate solution? This provides some options as well as some possibilities for design and development work *if* ther… Continue reading What Are My Options? Session Encryption Protocols Looking Forward

CyberSecurity 2028: By Default, By Design

In her keynote at the RSA Conference this year, futurist and game designer Jane McGonigal said: any useful statement about the future should at first seem ridiculous. In the post-RSAC recovery period, I pondered the future trends in information securit… Continue reading CyberSecurity 2028: By Default, By Design

DEF CON Groups 9723, Irena Damsky & Omri Moyal’s ‘Stories From The Dark Side Of Managing A Security Research Department In A Start-Up’

Permalink
The post DEF CON Groups 9723, Irena Damsky & Omri Moyal’s ‘Stories From The Dark Side Of Managing A Security Research Department In A Start-Up’ appeared first on Security Boulevard.
Continue reading DEF CON Groups 9723, Irena Damsky & Omri Moyal’s ‘Stories From The Dark Side Of Managing A Security Research Department In A Start-Up’

The Top Five SOC 2 Compliance Questions Answered

SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance.
The post The Top Five SOC 2 Compliance Questions Answered appeared first on Anitian.
The post The Top Five SOC 2 Compliance … Continue reading The Top Five SOC 2 Compliance Questions Answered