Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable.
The post Taming Network Chaos By Understanding User Behavior appeared first … Continue reading Taming Network Chaos By Understanding User Behavior

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent I… Continue reading Conditional Access Establishes Trust In the Network

Surprising Super Bowl Security Facts You Probably Don’t Know About

Last week, in a webinar with our customer Allina Health, speaker William Scandrett, CISO, explained Super Bowl security and safety risks that take place behind the scenes, primarily with protecting Super Bowl players’ and VIP data. Last year… Continue reading Surprising Super Bowl Security Facts You Probably Don’t Know About

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved to how to manage and address internal threats. In… Continue reading Going on the Offense: How to Eliminate Internal Threats

Detection Only Solutions Aren’t Enough For Today’s Security Teams

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection only solutions aren’t enough. They need more practical app… Continue reading Detection Only Solutions Aren’t Enough For Today’s Security Teams

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three questions all organizations should be asking to understand their d… Continue reading Data Loss Prevention Needs a Little Help from Its Friends