Topic
Increasing Visibility
6 Reasons to Prioritize Cloud Visibility in Your Cloud Security Strategy
As the saying goes, “You can’t protect what you can’t see.” That bit of wisdom couldn’t be more on point when you’re talking about enterprise data in the cloud, which is multiplying by leaps and bounds. It’s hard enough to keep track of on-premise data along with associated threats and attempted breaches. When you’ve offloaded […]
How a Unified Security Approach Can Address the Rising Costs of a Data Breach
IBM recently came out with its Cost of a Data Breach Report 2021. One of the main takeaways is the fact that the average total cost of a data breach increased from $3.86 million in 2020 to $4.24 million a year later. That’s a growth of 9.8%, the largest margin seen in seven years. The […]
Move from Reactive to Proactive Security with Open XDR
Let’s review the current state of cybersecurity for small- and medium-sized businesses (SMBs). According to Cybint, the average cost of a data breach for SMBs worldwide now stands at $3.9 million. Such an amount can be devastating to SMBs monetarily, but a data breach can also wreck an SMB’s reputation. That helps to explain why […]
Hybrid Intelligence Needed to Thwart AI-Powered Attacks
Just as defenders are leveraging AI elements such as machine learning and automation, adversaries are incorporating advanced techniques into their malicious activities. Hence the emergence of AI-powered attacks. Dubbed “one of the biggest fears within the security community” by Max Heinemeyer, Director of Threat Hunting at DarkTrace, AI-powered attacks leverage more offensive AI and less […]
Overcoming Five Key Challenges in the Way of Effective Security Operations
According to a recent ReliaQuest survey, enterprises continue to deploy an assortment of security technologies across the network, email, endpoint devices, and the cloud despite an overwhelming number of existing investments, yet these tools are not able to proactively defend organizations against the evolving threat landscape. While individually providing valuable security telemetry, these tools are […]
The CIS Controls – An Overview of What They Are and What’s New in Version 8
The events of 2020 accelerated many organizations’ plans for digital transformation, compelling them to adopt cloud computing and virtualization in support of remote work. It appears that those changes will last long after 2020. In April 2020, for instance, Gartner revealed that 74% of CFOs and finance leaders intended to move at least 5% of previously on-site […]
How to Achieve Best-in-Class Security Operations
Why you need outcome-driven Security Operations for today’s dynamic business and threat environment Digital transformation, hybrid or remote work, bring you own devices, shadow IT – business transformation is anything but static and cybersecurity teams are facing the brunt of it as guardians of the enterprise. How do security teams, already hampered with budget and […]
Re-thinking Security Operations in the New Threat Environment–And Why Open XDR is Key to its Success
Building an appropriate defense to meet the challenges of today’s complex and chaotic threat and risk environment requires organizations to rethink their cybersecurity. That includes evolving your Security Operations program to be more current, with access to the right mechanics and insights and the ability to focus on the security issues that impact your business most. Like all transformative processes, creating a best-in-class SOC takes time and commitment, but it’s well worth the investment. Fundamental to […]
How to Get the Most out of Your Security Monitoring with the Cyber Kill Chain Model
Updated June 2021 In our personal lives, many of us try to get the most out of a tank of gasoline – waiting until the red indicator shines bright and we finally have to stop at a gas station to fill our tank. This mindset extends to many aspects of our lives, both personally and […]
No results