Amid a global cybersecurity skills shortage, today’s companies need all the help they can get. Hiring cybersecurity staff is an obvious starting point, but it can take many months to fill and train a new hire. Fortunately, a range of security tools can also minimize a company’s risk of a cyberattack and make an impact immediately.more →
activereach and Cybereason are dedicated to teaming with Defenders to end attacks on the endpoint, across the enterprise, to everywhere the battle is taking placemore →
Network segmentation helps not only to mitigate the risk but also to significantly lower the risk of a double extortion attack by containing and minimizing the “blast radius” of a ransomware attack.more →
New BlueField DPU lineup and DOCA SDK push the boundaries of zero-trust protection; Check Point Software partnership to take on IoT security.
Cloud-minded enterprises face a number of challenges: From hybrid cloud architectures and infrastructure virtualization to multiple levels of attacks and a lack of visibility. Complex issues like these limit an enterprise’s ability to implement effective security strategies.more →
Data privacy in cyber-security is a hugely regulated sector. New regulations such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Regulation (GDPR) have added to the list of compliance mandates that already included PCI-DSS for financial data and HIPAA for patient information.more →
Frankly, it’s a tough time to be in cybersecurity. Perhaps the toughest ever. There have been over a dozen zero-days in the past three months alone, with countless organizations across the world affected.
We’re barely four months removed from SolarWinds—a watershed attack some thought would set the standard for the impact a vulnerability could have—and already dealing with a new attack that dwarfs it in scale.more →
We are pleased to partner with Sumo Logic, a global leader in continuous intelligence and cloud SIEM.
Sumo Logic offers a cloud-native architecture, built in AWS, which helps automate key security operations while delivering a truly modern security analyst experience with its highly-tuned user interface and SecOps workflows.more →
This month we are sharing a blog from our partner Netskope.
You’ve probably heard at one point or another the cliché that the internet is broken. It’s no secret that the underlying infrastructure that businesses around the world use to access cloud applications and data is flawed and wasn’t built with today’s scale in mind.more →