In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps,…
Browsing CategorySecurity Services
Five Key Trends on SOC Modernization
For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in…
Digital Shadows Weaken Your Attack Surface
Every tweet, text, bank transaction, Google search and DoorDash order is part of your digital shadow. We all have one, and the contents of your shadow aren’t always private. For…
Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty
Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers? Difficulties and Positive Changes The recent ISACA State of Cybersecurity 2022 survey provides…
Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services
Does the world need another acronym? Probably not. But it seems like one is born every day in the cybersecurity market. As a tradeoff for the brain power to recall…
How to Make Business Practices That Support Cybersecurity Response
Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more…
One Size Does Not Fit All Organizations
Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a…
IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management
Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. Often escaping security scans and periodic assessments, these…
Real Security Concerns Are Scarier Than Doomsday Predictions
The metaverse, artificial intelligence (AI) run amok, the singularity … many far-out situations have become a dinner-table conversation. Will AI take over the world? Will you one day have a…
Recovering Ransom Payments: Is This the End of Ransomware?
What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged…