Moving Beyond Honeypots to Next-Generation Deception Technology
By Wade Lance, field CTO, Illusive Networks When security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of…
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success…
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility…
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would…
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: …
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats….
A Timely Report for a Changing World – The 2020 Verizon Mobile Security Index
As the world rapidly adapts to working remotely and virtual learning, the importance of communicating cybersecurity best practices while using mobile devices is more important than ever before. Given the…
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies…
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root…
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave…
Cyber Defense and Cultural Heritage
By Milica D. Djekic Let’s look back several centuries in the past and try to imagine what technologies the people of that time might have used in their lives. If…
Drowning in A Sea of Threat Data? Consider A Curator
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the wake of increasing cybersecurity threats and data breaches, a whole host of network monitoring and threat intelligence…