Blog
The HeatWave is Spreading
by Alexei Balaganski
Just over a month ago, I wrote about the partnership between Oracle Cloud and Microsoft Azure that has finally enabled their customers to create “properly multi-cloud” applications without any hidden costs or limitations of earlier architectures. Well, unfortunately, announcements like that aren’t heard often, simply because the very idea of such partnerships goes against cloud service providers’ traditional business interests. This obviously has worked remarkably well for Oracle and Microsoft, but at least to a certain extent because there is no rivalry between...
Blog
Cyber Hygiene: Common Problems & Best Practices
by Osman Celik
To maintain their health and well-being, people are practicing personal hygiene routines on a regular basis. These routines are continuous and never completed. By taking proactive measures, people aim to protect their health against potential diseases and disorders. Analogically, organizations must also define a routine of proactive cybersecurity practices to identify and eliminate critical vulnerabilities and protect sensitive data. Cyber hygiene is a set of regular practices that intend to keep systems, networks, sensitive data, and users secure against cyberattacks, data breaches,...
Blog
Defining Modern Cybersecurity Leadership
by Matthias Reinwarth
Today's Leader Spotlight is one of our recent Analyst Chats in which host Matthias Reinwarth and KuppingerCole CEO Berthold Kerl talk about what makes a good cybersecurity leader.
Blog
Ransomware: The Invisible Enemy of Organizations
by Marina Iantorno
The cost of cyber-attacks to the global economy has risen to more than 400 billion US dollars per year. Cyber-attacks affect every business, from small companies to enterprises and governments. Recovering from attacks is expensive and time-consuming. So, how to make an organization more resilient to cyber-attacks in today’s digital world?   Digital transformation has changed the business and delivered new opportunities to organizations. However, going digital also increased the risk of becoming a victim of a cyber-crime. Fighting cyber-attacks are an unfair battle...
Blog
Raising User Awareness to Increase Cyber Resilience
by Raj Hegde
With the common use of heuristics and especially the advance of Artificial Intelligence (AI) in automated cyber threat mitigation, why do we still need to focus on user cybersecurity awareness?  In cybersecurity, there never was just one solution to reduce risk or fix mitigations. But you always need multiple layers of security. So each layer consists of additional aspects. Software and hardware measures are excellent at catching mass and known threats, with the advance in AI and also the detection of new threats based on known issues. But we can never neglect the...
Navigator
Ransomware Attacks on Critical Infrastructure
by Warwick Ashford
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also evolving the business model and may even be collaborating with competitors , say security researchers. Not only are tactics, techniques and procedures evolving, ransoms getting greater, demand for ransomware-as-a-service increasing, and double-dipping attacks that demand one payment to decrypt data and another to hold off publishing copies of sensitive data, but organizations are increasingly...
Blog
Who is Afraid of Security Automation?
by Alexei Balaganski
If there is one universally true statement about every organization regardless of size, location, or industry – it is that they all have too many security problems to deal with comfortably and in time. If you believe that you have your cybersecurity well under control, you probably simply don’t have full visibility into every corner of your IT… Unsurprisingly, the idea of replacing overworked (and increasingly scarce) humans with some kind of automation both for daily administrative routine and for responding to security incidents looks universally appealing to everyone...
Blog
The Importance of Standards in the IT Security Industry
by Raj Hegde
Is the security sector served well by the standards, regulations, and frameworks we have? The security industry has been around for a good few years and we've understood the importance of standards. If you look at the way that standards, frameworks, and regulations work, it does take quite some time for them to come into place. In the early days, we had standards, which may have been around specific technologies, but they were quite general. So for example, we had the standards around wireless encryption. So, there are those sorts of standards. We have standards around...
Navigator
PAM in a Post-Pandemic Digital World
by Warwick Ashford
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations manage Privileged Access must adapt and change accordingly to ensure the business remains competitive and secure. At the same time that hybrid working is becoming more common, as people take advantage of technologies that support working from home or on the road as well as the office, IT architecture is rapidly shifting to multi-cloud, multi hybrid environments in which identities of all kinds...
Blog
Security for Operational Technology Environments
by John Tolbert
Operational Technology (OT) systems encompass Industrial Control Systems (ICS), Critical Infrastructure Systems (CIS), and Industrial Internet of Things (IIoT). OT environments face threats similar to those that traditional enterprise IT systems do, as well as threats unique to each type and implementation.  ICS environments are those found in manufacturing facilities and warehouses, and may involve dedicated Human-to-Machine Interfaces (HMIs), Programmable Logic Controllers (PLCs), sensors, valves, actuators, etc. Critical Infrastructure includes regional and municipal power...
Previous
4 5 6 7 8 9 10 Next