Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →

Blog

Tackle the Data Deluge Problem for Better Cybersecurity

This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.

Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection

We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.

more →

Blog

CISO Perspective: Five Public Cloud Threats You’re Most Likely to Face

This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.

The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind. 

more →

Blog

The Importance of Web Application Security

This month we are sharing a blog from our security partner Oracle + Dyn that takes a look at web application security and what lies ahead.

Websites and apps are increasingly under attack, so effective web application security must be a top priority.

Before 2008, data breaches were somewhat rare, and most occurred because of human error, such as the loss of a laptop, a USB drive, or some other media.

more →

Blog

The WAF Market Is Broken – Should You Care?

Max Pritchard

A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).

more →

Blog

Recursive DNS – Does Your Organization Have A Security Blind Spot?

This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).

Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.

more →