Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →

Blog

Tackle the Data Deluge Problem for Better Cybersecurity

This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.

Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection

We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.

more →

Blog

CISO Perspective: Five Public Cloud Threats You’re Most Likely to Face

This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.

The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind. 

more →

Blog

The Importance of Web Application Security

This month we are sharing a blog from our security partner Oracle + Dyn that takes a look at web application security and what lies ahead.

Websites and apps are increasingly under attack, so effective web application security must be a top priority.

Before 2008, data breaches were somewhat rare, and most occurred because of human error, such as the loss of a laptop, a USB drive, or some other media.

more →