Cyber attacks pose financial and reputational risks, which necessitate investment in strong endpoint security defenses.
A communications point person is essential after a breach; they keep everyone in the loop, enabling cybersecurity folks to focus on cybersecurity.
Organizations need to invest in the right people, processes, and technologies to protect themselves from online threats in particular.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
Lookout Principal Technical Marketing Manager Daniel Feller explains how behavior analytics is a foundational element of the Lookout Cloud Security Platform, which focuses on internet security, private apps, and SaaS apps.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
In Ep. 3 of the Acceleration Economy Minute, Kieron references the work of fellow AE cybersecurity analysts who discuss how and why organizations must expand on their approach to defense.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
In Cybersecurity Minute, Episode 26, Chris Hughes reacts to the recently discovered attack on cloned version of GitHub repositories carrying malicious code.
Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.