Cybersecurity

Cloud security risks & how to mitigate them

Transitioning to the Cloud Safely and Strategically Even though the cloud is promoted as more secure than ever today, companies are experiencing an increasing number of data breaches. Why the apparent contradiction? Often, cloud customers lack a comprehensive understanding of cloud architectures and who is responsible for securing their data. Before organizations embark on their […]

Cloud security risks & how to mitigate them Read More »

Methodology for Characterizing Network Behavior of Internet of Things Devices

The National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) is working to improve the ability of network administrators and operators of Internet of Things (IoT) networks to identify, understand, and document network communication requirements of IoT devices. Documenting the types of devices and communication behaviors of those devices can allow

Methodology for Characterizing Network Behavior of Internet of Things Devices Read More »

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020

Security leaders, while supporting business growth and digital transformation, struggle with a multitude of challenges. We know this because you tell us, both in ongoing conversations and as part of our annual benchmark survey. Some challenges are focused on security, such as needing better visibility or automation, or striving for greater simplicity of management and

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020 Read More »

2019 Cyber Threatscape Report

The 2018 Cyber Threatscape report noted the clear need for more effective use of actionable threat intelligence. With state-sponsored activities a growing force to be reckoned with, extended supply chain threats, targets against critical infrastructure and a surge in miner malware and more financially motivated advanced persistent threats, CISOs have had their work cut out

2019 Cyber Threatscape Report Read More »

2020 Cybersecurity Outlook Report

The conflict of “good vs. evil” is a theme that’s captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the “good vs. evil” conflict reveals humanity’s intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear. In cybersecurity, this conflict

2020 Cybersecurity Outlook Report Read More »