How Pizza Can Be the Recipe to Understand Cloud Security
By Yohanan Berros, Customer Operation Managers, XM Cyber It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises…
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series…
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success…
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility…
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can…
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: …
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats….
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to…
A Timely Report for a Changing World – The 2020 Verizon Mobile Security Index
As the world rapidly adapts to working remotely and virtual learning, the importance of communicating cybersecurity best practices while using mobile devices is more important than ever before. Given the…
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher….
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to…
Secure Remote Active Directory Logins
By François Amigorena, CEO and founder, IS Decisions Organizations across the world have seen their way of working changed from face to face to remote working. This big change is…