Page 69 - index
P. 69







If a vendor has weak cybersecurity practices, it may be the first domino to fall in an attack that
jeopardizes the rest of the arrangement.

It all comes back to protecting the network from threats that originate from within the network.
For this purpose, businesses are turning to modern security tools like automated threat
detection and response.

These tools reduce the burden placed on human security teams and act as a force multiplier
that can verify and remediate threats at machine speeds. As supply chains grow more
integrated, technologies like these will become invaluable assets in protecting business
processes and data.

About the Author:

Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions
in March 2014. His responsibilities include analyst relations, competitive
and market intelligence, corporate visibility, M&A, and strategic
partnership development. Todd draws on his 17+ years of experience as
an equity research analyst where he covered the security industry for
much of that time. In his equity research career Todd provided research
coverage of over 60 companies across several technology sectors,
including security, infrastructure software, data center/cloud hosting, and
healthcare IT.

Connect with Hexis online: http://www.hexiscyber.com/

Hexis Blog: http://www.hexiscyber.com/blog

Twitter: @hexis_cyber

LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions




















69 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   64   65   66   67   68   69   70   71   72   73   74