Amid a global cybersecurity skills shortage, today’s companies need all the help they can get. Hiring cybersecurity staff is an obvious starting point, but it can take many months to fill and train a new hire. Fortunately, a range of security tools can also minimize a company’s risk of a cyberattack and make an impact immediately.
more →Tag: cyber security
Blog
Addressing the Governments Cybersecurity Strategy for 2022-2030
activereach and Cybereason are dedicated to teaming with Defenders to end attacks on the endpoint, across the enterprise, to everywhere the battle is taking place
more →Blog
Stopping Ransomware and Lateral Movement with Segmentation
Network segmentation helps not only to mitigate the risk but also to significantly lower the risk of a double extortion attack by containing and minimizing the “blast radius” of a ransomware attack.
more →Blog
NVIDIA Enables Future of Zero-Trust Enterprise Security
New BlueField DPU lineup and DOCA SDK push the boundaries of zero-trust protection; Check Point Software partnership to take on IoT security.
Cloud-minded enterprises face a number of challenges: From hybrid cloud architectures and infrastructure virtualization to multiple levels of attacks and a lack of visibility. Complex issues like these limit an enterprise’s ability to implement effective security strategies.
more →Blog
Using Zero Trust Security to Ease Compliance
Data privacy in cyber-security is a hugely regulated sector. New regulations such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Regulation (GDPR) have added to the list of compliance mandates that already included PCI-DSS for financial data and HIPAA for patient information.
more →Blog
A Vulnerable World: RiskIQ’s Unique View of the Microsoft Exchange Landscape
Frankly, it’s a tough time to be in cybersecurity. Perhaps the toughest ever. There have been over a dozen zero-days in the past three months alone, with countless organizations across the world affected.
We’re barely four months removed from SolarWinds—a watershed attack some thought would set the standard for the impact a vulnerability could have—and already dealing with a new attack that dwarfs it in scale.
more →Blog
Building Your Modern Cloud SIEM
We are pleased to partner with Sumo Logic, a global leader in continuous intelligence and cloud SIEM.
Sumo Logic offers a cloud-native architecture, built in AWS, which helps automate key security operations while delivering a truly modern security analyst experience with its highly-tuned user interface and SecOps workflows.
more →Blog
The Internet is Broken
This month we are sharing a blog from our partner Netskope.
You’ve probably heard at one point or another the cliché that the internet is broken. It’s no secret that the underlying infrastructure that businesses around the world use to access cloud applications and data is flawed and wasn’t built with today’s scale in mind.
more →