All of us in the security industry realize that we face a virtually insurmountable task to ensure that the data belonging to our organizations and customers is kept safe and secure. If you step back and think about it, the list of potential perpetrators is daunting in scope. It includes cybercriminals, hacktivists, foreign governments, and…

If you do incident response work, you know it doesn’t matter whether you work for a large corporation or a small organization — an incident can strike at any given time. Unfortunately, there are often huge time lapses between when an incident occurs, when it is detected and when the security team can address it….

Two major new product announcements were made at Fortinet’s Accelerate 18 conference this week, including a new machine learning (ML) threat intelligence and detection offering, along with a major upgrade to the Fortinet Security Fabric (FortiOS). Accelerate 18, held in Las Vegas, Nevada, is Fortinet’s annual global partner and user conference, attended by around 2,000…

Privilege escalation is one of the key components of any attack that involves penetrating a system. If threat actors have limited access due to a current user’s privilege levels, they will naturally aim to escalate their privileges before expanding the scope of the attack. How can security professionals detect malicious escalation techniques before adversaries get…

Designing your security information and event management (SIEM) strategy can be very challenging, particularly in complex environments that depend on many systems and stakeholders. For security leaders, it may seem as though this work is never complete. Indeed, maintaining an effective SIEM program requires a cyclical approach of reviewing business objectives, planning detection and response…

2017 has been yet another year full of widespread, highly disruptive ransomware attacks, data-destroying malware outbreaks and other headline-grabbing security incidents. However, with more organizations increasing their level of security awareness, sharing threat intelligence, achieving regulatory compliance, and recruiting more women and new collar workers to launch cybersecurity careers, there is plenty to be thankful for this Thanksgiving.

Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and goals. As an enterprise, you used to worry about your competitors and your goal was to outpace them, to outservice them, and to outsmart them. Today, you can be the smartest and the fastest and have…