Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure�� and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being...
Hybrid clouds represent the new normal for data centers, which, in turn, warrants a new security model that needs to be grounded in an understanding about what is different about cloud infrastructure. IT and security professionals are well aware of the need to retool for this new normal.
Given strong adoption of...
Historically, the only way organizations could come close to capturing high-fidelity data about what's happening on their network was to invest in a packet capture system.
That's so yesterday.
Full packet capture systems were never designed to facilitate the detection or investigation of advanced threat actors....
The latest version of the Trump administration's draft cybersecurity executive order would direct the federal government to take a risk-based approach to IT security and hold agency heads responsible for the security of their organizations' IT assets.
"Next-generation" endpoint protection, or next-gen AV, has been getting a lot of press recently. But what does the term actually mean?
For IT security managers under pressure, the most important thing isn't the latest buzzword, but finding a solution which is effective in protecting their organization from an...
The notion of "next-gen" is now promoted by some providers of endpoint security software as a way to improve the efficacy of protecting endpoints from compromise, given the prominent role endpoints play in cybersecurity attacks, the ways in which mobility and cloud apps have expanded the attack surface area, and the...
High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands...
The endpoint security market is growing because more security professionals see the endpoint security suite vendors as a way to address their top challenges. What's more, security pros increasingly trust providers in this space to act as strategic partners, advising them on top endpoint security decisions.
The...
The security landscape changed dramatically with the maturation of crypto-ransomware in 2014. Not only did this new type of malware bring about a more lucrative business model for attackers, it also spurred the adoption of many so-called 'next-gen' endpoint security techniques.
While these techniques bring...
Searching for the right cloud security provider can often be confusing and challenging. Many providers appear to be the same at first glance, offering customers similar metrics and promises while more often than not the information you need to make a real comparison is not readily available.
This white paper...
While security teams continue to add to their threat protection arsenal, they are struggling to keep up with the threats. Security information and event management (SIEM) products, threat analytics platforms, advanced endpoint protection (AEP) products, user entity behavior analytics (UEBA) tools, and incident...
The Healthcare Information and Management Systems Society's 2017 Conference will offer a slew of educational sessions and informative exhibits focused on top cybersecurity and data privacy challenges facing the healthcare sector. Catch our coverage.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
Cloud computing initiatives, network monitoring and risk management are driving network security operations. Meanwhile, federal agencies face record levels of threats yet still rely on manual processes and outdated point tools. Agency network security operations must be modernized to streamline network security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.