How future policy and regulations will challenge AI

I recently wrote about how radical the incorporation of artificial intelligence (AI) to cybersecurity will be. Technological revolutions are however frequently not as rapid as we think. We tend to see specific moments, from Sputnik in 1957 to the iPhone in 2007, and call them “game changing” – without appreciating the intervening stages of innovation, implementation and regulation, which ultimately result in that breakthrough moment. What can we therefore expect … Read more »

4 steps to managing shadow IT

Shadow IT is on the rise. More than 80 percent of employees report using apps that weren’t sanctioned by IT. Shadow IT includes any unapproved hardware or software, but SaaS is the primary cause in its rapid rise. Today, attempting to block it is an outdated, ineffective approach. Employees find ways around IT controls. How can you empower your employees and still maintain visibility and protection? Here are four steps … Read more »

Navigating cybersecurity in the New Age

In today’s rapidly evolving tech landscape, tools, gadgets, and platforms aren’t the only things advancing. Cyberattacks are becoming more powerful, wide-ranging, and harmful to organizations around the globe. For any enterprise, cybersecurity is one of the most essential factors to business success. With new and emerging technology, leaders have to explore modern security needs via stronger, more intelligent solutions. Today, the modern security officers must: Recognize the intricacies of the … Read more »

Is social engineering the biggest threat to your organization?

“Always remember: Amateurs hack systems. Professionals hack people.” –Bruce Schneier, CTO, Counterpane Internet Security, Inc. All over the globe, social engineering is a dominant and growing threat to organizational security. Since January 2015, the number of social engineering victims identified by the FBI has increased 270%, costing businesses more than $2.3 billion. Social engineering happens when a hacker uses manipulation, influence, or deception to get another person to release information … Read more »

Strategies to build your cybersecurity posture

This post is authored by Michael Montoya, Executive Advisor, Enterprise Cybersecurity Group Asia Region. “You clicked on an infected message…” In my prior life of managing an enterprise email environment, I started thousands of messages with that response to the victims of the infamous “love bug” email. Looking back, this was a simple task compared to what we now face. Over the past 20 years, I have been on the … Read more »

How to protect yourself from cloud attacks

As organizations are rapidly making the move to the cloud, safeguarding cloud resources against advanced cyber threats has become a top priority. Sophisticated attack vectors require a new approach to security. How can you leverage unique insights into a variety of threats to help defend against cloud attacks? To learn more about how to keep your cloud secure—especially in this ever-present era of cybercrime—join our webinar, Take your cloud security … Read more »

The two-pronged approach to detecting persistent adversaries

Advanced Persistent Threats use two primary methods of persistence: compromised endpoints and compromised credentials. It is critical that you use tools to detect both simultaneously. With only one or the other in place, you give adversaries more opportunities to remain on your network. There are many attack vectors within these two main categories, including the use of zero-day attacks, exploiting vulnerabilities or weak defenses, using social engineering, creating hand-crafted malware … Read more »

Are my IoT deployments secure?

According to IDC, there will be 28.1 billion connected Internet of Things (IoT) devices by 2020. Considering the numerous benefits of IoT—connected assets, predictive analytics, real-time intelligence—this isn’t all that surprising. But what about the inherent risks? IoT-based infrastructure is a wonderful intelligence tool, but, if not properly secured, can open the door for cyberattacks. A recent example of this is the massive hacking operation that brought down Twitter, Reddit, … Read more »

Get both sides of the shadow IT story

There are a number of reasons why employees use non-approved SaaS applications, and there are very good reasons IT wants to limit it. To reach a point where both sides are working together, it’s important to understand both perspectives. Through the business lens: Employees look to drive results first Organizations are in very competitive environments with demanding business objectives and far-reaching goals. Employees are under intense pressure to deliver results … Read more »