XDR: Tech Stack, Service, Process, or All Three?

extended detection + response

You could ask ten security professionals in a room what eXtended Detection and Response (XDR) is and you would get ten different answers. According to Gartner, “XDR is a unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components.” Seems simple, in theory, yet there is so […]

3 Scary Stories of Data Breach Disasters

Scary Data Breach Stories

Tales of Frightful Security Breaches Gather around the campfire, everyone! Just in time for Halloween, we’re going to tell scary stories for data breaches. Beware! These three cautionary tales about devastating data breaches are more horrifying than fright-night classics like “I Showed Up to a Halloween Party Dressed as Hulk, but No One Else Was […]

How Multi-Cloud Environments Expand Your Attack Surface and How to Manage and Reduce the Risk

Multi-Cloud Environments Expand Your Attack Surface

In a highly connected world, businesses of all sizes are picking up the pace on adopting multi-cloud environments from cloud-based services to infrastructure. The benefits are indisputable: A richer and more versatile set of cloud options, enhanced redundancy, and a superior security/cost value from multi-cloud environments. But using hybrid cloud environments expands the attack surface […]

Cloud Security Using Defense in Depth

Cloud Security Using Defense in Depth

by Paul Caiazzo Many companies assume cloud security for their data falls under the responsibility of their cloud service provider (CSP): That this entity has adequate tools, policies and procedures in place for protecting the data with which they are entrusted. While this is true to some extent – certain controls within a comprehensive cloud […]

10 Factors for Cloud Security During Selection and Implementation

Cloud Security During Selection and Implementation

In the not-so-distant past, IT security was based on perimeter protections surrounding racks of on-premises servers. There was a clear distinction between inside versus outside, and it was theoretically possible to admit only authorized users and connections. Today, the internet, smart devices and cloud services are changing the way we do business and offer undeniable […]

The Importance of Identity Management and Governance for Telework Security

Identity Management and Governance for Telework Security

During the COVID-19 pandemic, organizations’ switch to a remote workforce has, in many cases, left employees working from home without the tools or training required to protect the organization. This served to highlight the need for identity management and governance for telework security. While enforcing the use of a virtual private network (VPN) when working […]

Achieve Secure Cloud Adoption Using HITRUST

Using HITRUST for Secure Cloud Adoption

Most security teams are accustomed to operating in an environment where they have a high level of access to and control over their network infrastructure. In an on-premises data center, the organization owns and controls their own infrastructure, making it relatively easy to implement required security controls, perform audits, and achieve and maintain regulatory compliance. […]

Stop! Using Online Collaboration Tools Until You Read This

Online collaboration tool security

The COVID-19 pandemic has caused many organizations to abruptly adopt a remote work policy for most or all their staff. One impact of this transition is a spike in the use of online collaboration and videoconferencing tools such as Zoom, LogMeIn GoToMeeting, Cisco WebEx, and Microsoft Teams. Cybercriminals Are Targeting Online Collaboration Platforms The sudden […]

Security Implications of the Internet of Things

Devices connected to the Internet of Things (IoT) add substantial value to businesses and industries such as manufacturing, transportation, and utilities among others according to a recent Tech Pro Research Survey. By automating tasks and making functionality easily accessible to the average user, many devices, like Internet-enabled security cameras and medical devices, have the potential […]