December 1, 2017
Via: CSO OnlineA few years ago, the cybersecurity industry adopted a new mindset that went something like this: Cybersecurity controls are not very effective. Therefore, sophisticated cyber adversaries can easily circumvent them, compromise networks, and execute data breaches. Hence, trying to prevent […]
August 11, 2016
Via: Dark ReadingMake proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures. In my travels over the last six months, meeting with customers across many vertical markets, I have heard a growing […]
September 9, 2015
Via: cloud-security#microsoft has acquired security company #adallom in a bid to give IT departments more control over application access and data stored across cloud services. The growing popularity of cloud services and the move of critical apps from in-house data centers […]
July 28, 2015
Via: network-securityPeople much smarter than me once said, “great defense requires understanding the enemy.” And man, that sounds wise as hell! That’s like long bearded dude on a mountaintop type of wise. And so we run with that and turn it […]
April 11, 2024
March 21, 2024