Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl

It should be no surprise to anyone that the digital age has created data sprawl. Information and critical data are no longer confined to desks and filing cabinets in locked rooms, but stretched across the enterprise in locations far and wide. Data locations first expanded to structured databases, then unstructured local user systems and then…

Companies face legion of security operations challenges

After a week away from all things cybersecurity, I’m back at work and focusing on security analytics and operations again. Alarmingly, most organizations readily admit to problems in this area. For example, a recent ESG research survey of 412 cybersecurity and IT professionals identified some of the biggest security analytics and operations challenges. Some of…

Antivirus: From Stand-Alone Product to Endpoint Feature

Endpoint experts discuss the evolution of AV and its shift from stand-alone product to a feature in broader security tools. The endpoint security evolution is underway. Antivirus (AV) isn’t dead, but its nature is changing as enterprise threats become faster, more widespread, and more complex. “Antivirus has become, to me, more of a specific feature…

Getting Ahead of SD-WAN Security With the Zero Trust Model

As businesses across the world become more geographically diverse and move toward an increasingly hybrid IT environment, legacy infrastructure is struggling to keep up. With more data flowing over enterprise networks from multiple sources, the demand for software-defined wide area network (SD-WAN) technology is growing exponentially. A report from IDC predicted that this technology will…

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gone are the days of the Nigerian prince promising fortune to unsuspecting email recipients. Attackers have stepped up their phishing game and evolved their tactics to entice employees to click links or open attachments, preying on the opportunity to spread persistent malware or compromise credentials. These threat actors relentlessly target employees — both at work…

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to…

Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age

One of the fundamental problems with cybersecurity is that organizations often do not realize when they are compromised. Traditional incident response methods are typically reactive, forcing security teams to wait for a visible sign of an attack. The problem is that many attacks today are stealthy, targeted and data-focused. Just stop for a moment to…

Fighting Financial Fraud in an Increasingly Digital World

Everywhere we look, we see some form of digital technology. People have access to computers, cellphones, televisions and even Wi-Fi-enabled smart appliances. Technology advances every day, giving way to exciting, innovative and life-changing experiences. Take cellphones, for example. Not too long ago, cellphones were a luxury. They were used simply to call people — texting…