How cloud transformation helps stop emerging threats

Automation, agility, efficiency and cost play critical roles in accelerating public sector transformation through the cloud, according to an experienced cybersecurity-focused executive with an eye on the future. They also are provide a smarter, more progressive approach to protecting data, said Rajiv Gupta, a senior vice president in the cloud security business unit at McAfee, during an Oct. 20 presentation at CyberTalks, the annual summit of government and private sector leaders presented by Scoop News Group. The need to consider more modern security approaches has taken on new urgency since the COVID-19 pandemic impacted U.S. firms, forcing leaders to reconsider many of their operating assumptions. “Not only have you seen, in the U.S., employees working from home but, in many cases, the employees accessing large public cloud services,” Gupta said during a keynote presentation. “What we’ve seen is that a threat landscape has changed, the threat vectors have changed, the […]

The post How cloud transformation helps stop emerging threats appeared first on CyberScoop.

Continue reading How cloud transformation helps stop emerging threats

Why professional and managed security services make increasing economic sense for the public sector

The growing complexity of IT systems and a shortage of talent make managed and professional services a smart choice for enterprise IT operations.

The post Why professional and managed security services make increasing economic sense for the public sector appeared first on CyberScoop.

Continue reading Why professional and managed security services make increasing economic sense for the public sector

An executive perspective: The evolution of security and networking

Government and critical infrastructure organizations can no longer deliver services at scale and still defend against today’s cybersecurity threats without rethinking their approach to security. Ken Xie, cofounder and CEO of Fortinet, sits down with us to discuss what that approach must look like and which primary cababilities organizations must integrate into their operations to more effectively secure their enterprises.  CyberScoop: How have you seen the arc of cybersecurity evolving over the last decade to where enterprises and government agencies are today? Ken Xie: Today, data and applications move between different users, devices and networks, making visibility and control more difficult. The trusted zone has disappeared and the traditional perimeter extends through and with mobile end-user and IoT devices, even beyond the entire infrastructure. At the same time, digital innovation is continuously introducing new edges and fragmenting the perimeter even further. Of course, cloud adoption plays a critical role in […]

The post An executive perspective: The evolution of security and networking appeared first on CyberScoop.

Continue reading An executive perspective: The evolution of security and networking

Symantec shakeup creates fresh opening to shift security strategies

Steve McNamara is Regional Vice President Sales for VMware Carbon Black and a former vice president at Symantec. Information technology is always changing and so is the industry behind it. But recent developments surrounding the fate of one of the world’s most widely relied-upon suppliers of enterprise security products have created a significant “disturbance in the force.” In an odd twist on the perils of vendor lock-in, enterprise CIOs who rely on Symantec enterprise security products have found themselves in lock-out, following the decision late last year by Symantec’s new owner, Broadcom, to abandon support for all but 2,000 of Symantec’s most profitable enterprise security customers. Some reports since then suggest that number is closer to 700 accounts. When Broadcom completed its $10.7 billion acquisition of Symantec Enterprise Security in November of last year, it came with all the fanfare of one tech giant acquiring another in the name of […]

The post Symantec shakeup creates fresh opening to shift security strategies appeared first on CyberScoop.

Continue reading Symantec shakeup creates fresh opening to shift security strategies

Enabling secure remote work by embracing Zero Trust

Steve Faehl is Microsoft’s U.S. security chief technology officer, responsible for helping organizations develop strategies to reduce risk by improving their cyber defenses. One of the greatest challenges we often hear from public and private sector CIOs, when it comes to achieving a Zero Trust IT operating environment, is the question of how to tackle such a massive undertaking — and where and how to begin. If there was one lesson we learned at Microsoft as we sought to establish Zero Trust security principles internally — and we learned many lessons — it was the importance of starting with a fundamental premise: To build out assurances in places where we traditionally relied on implicit trust. That premise began at Microsoft with one of Bill Gates’ famous internal strategy memos  on “trustworthy computing.”  While the term Zero Trust hadn’t yet been coined, the concept and principles are essentially the same. They […]

The post Enabling secure remote work by embracing Zero Trust appeared first on CyberScoop.

Continue reading Enabling secure remote work by embracing Zero Trust

Adjusting to the new security realities of a remote workforce

CIOs and CISOs have been under intense pressure to meet the needs of homebound workers, while simultaneously needing to take added steps to safeguard their enterprise networks. Steve Grobman, senior vice president and chief technology officer at McAfee, has a global view of that challenge. Grobman leads the company’s worldwide development of next-generation cyberdefense and data science technologies as well as threat and vulnerability research. In an interview for CyberScoop, Grobman shares his observations on what enterprise IT leaders are encountering — and measures that they might take to mitigate risks associated with home networks essentially becoming part of the enterprise IT infrastructure. This interview, underwritten by McAfee, was edited for brevity. CyberScoop: Organizations are sprinting to equip their employees to work remotely. How is that impacting the cyber risks enterprises face across their networks? Steve Grobman: Organizations must recognize that there are risks associated with new types of employees […]

The post Adjusting to the new security realities of a remote workforce appeared first on CyberScoop.

Continue reading Adjusting to the new security realities of a remote workforce

How network modeling and cyber hygiene improve security odds for federal agencies

Agencies that have built network infrastructure over decades may not be doing enough to manage basic cyber-hygiene practices and stay ahead of modern threats, cautions a new report. When out-of-date configuration rules lurk on networks, attackers essentially have a back door to walk into government systems. However, modern network modeling platforms, capable of integrating into existing infrastructure, can help agency IT departments identify and manage cyber risks and accelerate essential hygiene practices. Network modeling tools give agency leaders a way to simulate upgrades and evaluate the impact of planned changes to their networks, as well as review past connections and rules. This can be helpful when trying to accurately understand the costs associated with cyber risk, explains the report, produced by FedScoop and CyberScoop and underwritten by RedSeal. Cyber-hygiene practices to reduce risk Targeted attacks on government agencies are becoming more sophisticated. To defend networks, IT administrators need to know […]

The post How network modeling and cyber hygiene improve security odds for federal agencies appeared first on CyberScoop.

Continue reading How network modeling and cyber hygiene improve security odds for federal agencies

How to demonstrate trust in cybersecurity practices with organization leaders

Chief information security officers working at high-profile enterprises know their jobs are as much about guarding their organization’s brand reputation and trust as they are about IT security. But to ensure that trust, CISOs need to know whether their security investments are actually working, and that calls for having metrics that matter to senior management, according to a new report. “It’s all about measurement,” says Home Depot CISO Stephen Ward, in remarks quoted in “The 2019 Trust Report,” released by Synack. “CISOs need a way to present security to their executive team and board in a way that clearly demonstrates and measures business risk to the organization. The executive team doesn’t want to talk about security — they want to talk about risk.” The report provides CISOs with a framework for using data from their security programs to gain a clearer sense of their organization’s ability to withstand damaging cyberattacks […]

The post How to demonstrate trust in cybersecurity practices with organization leaders appeared first on CyberScoop.

Continue reading How to demonstrate trust in cybersecurity practices with organization leaders