
Rethinking the Security Org for a Burnout Era
Burnout Math Doesn’t Work Anymore

Burnout Math Doesn’t Work Anymore

Enterprises are juicy cyberattack targets for several reasons. They provide an enormous quantity of user data that hackers can exfiltrate; and, equally important, enterprises have the budget to pay large sums in ransomware attacks. Additionally, many enterprises deal with government contracts and house sensitive information that hostile nations are interested in. Enterprise security monitoring is essential when the stakes are this high. Let’s dive into what those stakes are, and how security monitoring can help. How can enterprise security monitoring […]

Just how much security does a VPN give you? What could go wrong with the security you think you’re enjoying, and what potential problems do you need to be aware of?

The cybersecurity market is unfortunately loaded with acronyms that can make selecting the right security service confusing. Some of these acronyms overlap, while others have ambiguous meanings that differ depending on who’s providing them. The reason for this disparity in meanings is partly due to marketing hype—as a term becomes popular, marketing teams jump on the bandwagon, adding features to an existing service so they can say they have the same popular offering when, in reality, not much has changed. […]

Fun with source code and prime numbers. Duck answers a reader’s question with some lightly technical fun, along with some intriguing but gentle mathematics.

Credential stuffing is all over the news at the moment. But who should bear the cost?

Our newest writer, Paul Ducklin, tells it as he sees it – that we’re all served better when we treat cybersecurity as a value to be maximised, not as a cost to be minimised.

During my 25 years of working in the security space, I’ve seen many shifts both in the security industry and the world outside of it. The technology that has been developed in the last two decades has drastically affected the way we work and the way we secure our business operations and data. I’ve watched as the industry shifted from securing data on servers to the cloud, and I believe another equally disruptive shift is coming soon. There are many […]

As cyber threats grow more numerous and sophisticated, they’ve placed an excessive burden on IT departments. Managed security services have emerged as a way to better serve a company’s cybersecurity needs and fill key gaps. There are many types of managed security services each with its own benefits and best applications. Let’s look at some of the more common types of managed security services to help you understand which might be the best for your organization. Types of managed security […]

The days of purchasing anti-virus software for your organization and knowing that’s all you need to do to be secure are long gone. Businesses large and small need a full security tech stack that includes a variety of tools and solutions to address a multitude of threats. The cybersecurity market, however, is crowded. With more than 3,500 vendors to choose from, it can be difficult to assess which vendors will best address your security concerns. The issue is further complicated […]

The U.S. Securities and Exchange Commission (SEC) has been busy trying to protect investors from losing funds due to cyberattacks. As the number of cyberattacks continues to rise, the SEC has taken a hard stance: A breach is an inevitability. To help affected parties, companies need to be prepared and communicate when an incident occurs. In March of 2022, the Cyber Incident Reporting for Critical Infrastructures Act of 2022 (CIRCIA) was signed into law. The SEC has since proposed additional updates to […]

Even the best-managed security programs can fall short if implemented poorly. Correctly executing managed security is just as important as selecting the right vendor. In fact, it is the final step in choosing that vendor for your business. Let’s dive into how to best implement managed security in your business. Importance of a Plan in Managed Security Implementation If you’ve done your homework right, you have a shortlist of vendors who appear to have the necessary expertise, time, resources, and […]

The escalating complexity of business IT environments, coupled with an increase in security threats, means companies can no longer ignore taking their security posture seriously. Unfortunately, the worldwide cybersecurity labor shortage continues to grow, adding to the challenge of having an in-house department that can protect and respond to cyber threats. Furthermore, security needs have become increasingly specialized, requiring expert hands on deck for your company to be fully protected. The complex nature of an organization’s distributed environment today means […]

Most of the sensational data breaches that get covered on the news are about consumer-focused companies. That makes sense when we think about the impact that can come from these kinds of attacks. In one fell swoop, millions of customer records can be lost. Obviously, this carries a lot of weight since it is relevant to a wide cross-section of people. Some noteworthy breaches of this magnitude include T-Mobile, SolarWinds, and LastPass. Supply chain companies may think they don’t need […]

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






