Adaptive protection against invisible threats

In fact, in most medium-sized companies’ cybersecurity strategies, even with an endpoint solution, there are likely to still be gaps that can and should be closed. In this article, we look at what those gaps are and how to fill them. Continue reading Adaptive protection against invisible threats

Researchers call for a determined path to cybersecurity

As members of a global community, we often feel that we are failing to achieve an adequate level of cybersecurity. We believe it can be explained by a lack of global willpower, double-dealing activities, and the lack of global regulations. Here, we develop these hypotheses and outline ideas to advance cybersecurity. Continue reading Researchers call for a determined path to cybersecurity

Unisys Adds Visualization Tools to Stealth Platform

Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time. Vishal Gupta, ch… Continue reading Unisys Adds Visualization Tools to Stealth Platform

DEF CON 28 Safe Mode Voting Village Village -Jody Westby’s ‘Policy Approach To Resolving Cybersecurity Problems’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!
Permalink
The post DEF CON 28 … Continue reading DEF CON 28 Safe Mode Voting Village Village -Jody Westby’s ‘Policy Approach To Resolving Cybersecurity Problems’

Defining Security Policies to Manage Remote Insider Threats

This is the time to define the new normal; having well-defined policies in place will help businesses maintain its security posture while bolstering the security of the ever-increasing work-from-home population. Continue reading Defining Security Policies to Manage Remote Insider Threats

IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts

IT workers may have had the toughest transition to the WFH model. Not only were they tasked with preparing entire organizations for remote work, setting them up with the right equipment and ensuring access to the right technologies and software—and do… Continue reading IT Relaxing Security Policies During WFH While Employees Step Up Their Efforts

Security and Visibility When Users Are Not in the Office

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic
As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users&#82… Continue reading Security and Visibility When Users Are Not in the Office

Discussing AppSec Policies within DevSecOps

There’s no denying that today’s digital ecosystem must be protected. But preventing increasingly frequent and severe attacks, which often target customer data and confidential information, requires more out of your organization’s secu… Continue reading Discussing AppSec Policies within DevSecOps