Cybersecurity control failures listed as top emerging risk

Cybersecurity control failures was listed as the top emerging risk in 1Q21 in a global poll of 165 senior executives across function and geography, according to Gartner. Despite a myriad of risks resulting from the pandemic, such as the new work enviro… Continue reading Cybersecurity control failures listed as top emerging risk

Remote work increasing the growth rate of the EDR market

Malware and virus attacks have increased substantially over the years. With the evolution of modern technologies, the threats associated with them have also increased. But on the brighter side, technology has advanced further to tackle an extensive ran… Continue reading Remote work increasing the growth rate of the EDR market

XDR and MDR: What’s the difference and why does it matter?

The cybersecurity industry loves acronyms and XDR is rising swiftly to the top of the charts of the current lexicon. Extended detection and response (XDR) is a designation used when you do not have the ability to cover a wide range of threat vectors. S… Continue reading XDR and MDR: What’s the difference and why does it matter?

The SOC is blind to the attackable surface

A security operations center (SOC) is the central nervous system of any advanced cybersecurity program. Yet even the most well-funded, highly organized and properly equipped SOC is often no match for a simple misconfiguration error. Organizations have … Continue reading The SOC is blind to the attackable surface

Knowledge graphs: The secret of Google Search and now XDR

Wading through waves of alert noise to find real threats and manually connecting the dots to find context in real-time attacks are essential capabilities in today’s cyberthreat detection and response battleground. While it sounds impossible, the same t… Continue reading Knowledge graphs: The secret of Google Search and now XDR

Security automation: Time for a new playbook

From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT devices and a highly distributed workforce, enterprises and government agenc… Continue reading Security automation: Time for a new playbook

Three signs your SOC is ready for XDR

Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio consolidation and convergence towards packaging multiple solutions into one, there’s an… Continue reading Three signs your SOC is ready for XDR

Healthcare organizations are sitting ducks for attacks and breaches

Seventy-three percent of health system, hospital and physician organizations report their infrastructures are unprepared to respond to attacks. The survey results estimated 1500 healthcare providers are vulnerable to data breaches of 500 or more record… Continue reading Healthcare organizations are sitting ducks for attacks and breaches

Adopting more tools doesn’t necessarily improve security response efforts

While organizations have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has declined by 13% during this same period, IBM reveals. The global survey conducted… Continue reading Adopting more tools doesn’t necessarily improve security response efforts