Make No Mistake — Microsoft Is A Security Company Now

Forrester IT

Microsoft has announced support for macOS in its rebranded Microsoft Defender ATP product, taking this product from being an offering that could be considered an add-on for hardening its own operating system to a multiplatform security solution.

The Forrester Wave™: Managed Security Services Providers (MSSPs), Europe, Q4 2018

Forrester IT

I published my first Forrester Wave™ today, covering the managed security services provider (MSSP) market in Europe.

Tackle Tomorrow’s Digital Business Security Risks

CEB IT

Security and risk management leaders responsible for information security must evolve their practices and organizational cultures to keep pace with the digital business era. Risk management, governance, business continuity and people — the most important asset — are critical elements of a successful risk and security program,” says Earl Perkins , Vice President, Analyst at Gartner says. IT Security cybersecurity Digital Business risk risk management

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. Cyber Security Disruptive IT information technology National securityThe time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […].

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Why 91% of IT and security pros fear insider threats

CTOvision

Read Alison DeNisco Rayome take a look at why IT professionals still fear insider threats the most on Tech Republic : The biggest security threat to your business likely isn’t a cybercriminal or hacktivist, but someone already in your organization, according to a Wednesday report from BetterCloud. Cyber Security News

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

cloud security cybersecurity data security promotedI recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here.

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

JASK: Modernizing security operations via an Autonomous Security Operations Center

CTOvision

Driven by AI and ML, the JASK autonomous security operations center (ASOC) platform frees analysts to become proactive threat investigators and responders. We believe the JASK approach is exactly what is needed in the continual struggle to automate security response.

Verisign: Security Services

CTOvision

This feat alone requires world class best technology design, operation, maintenance and security skills. Verisign provides services and technology capabilities to enterprises including Managed DNS, Recursive DNS, DDoS protection and security threat intelligence offerings.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

The Security Snapshot: Cybersecurity And Privacy In 2019 — Prepare For The New; Protect The Established

Forrester IT

Introducing our new monthly blog series, “The Security Snapshot,” which will curate and highlight key pieces of research from the security and risk (S&R) team. security & risk

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Embrace a Passwordless Approach to Improve Security

CEB IT

Easy-to-guess and reused legacy passwords are vulnerable to a wide range of attacks and, by themselves, do not provide proper security for sensitive systems and confidential information. For organizations, there’s no longer a need to store passwords, leading to better security, fewer breaches and lower support costs. Security and identity and access management (IAM) leaders can implement a passwordless approach in two ways.

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]. Artificial Intelligence CTO Cyber Security

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Rushed Privacy Features Results In Sloppy Security

Forrester IT

cybersecurity privacy security & risk promotedFacebook Loses More User Data (This Time Unintentionally) Facebook announced that it experienced a breach this week that lost 50 million user’s data. Ironically, the breach happened in part due to exploited bugs in three features developed to give users more control over their privacy. Some quick key lessons to take away from this breach: […].

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 InfoSec casino infosec security awareness

AI in cyber security: a help or a hindrance?

CTOvision

Cyber Security NewsWith a disappearing IT perimeter, a widening skills gap and the increasing sophistication of cyber attacks, it is not surprising that many enterprises are struggling to deal with the current cybersecurity landscape. It’s not just the continued data breaches that have hit the media headlines this year, but it’s the nature of the data – […].

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

Garrison: Secure Web Browsing

CTOvision

With this post, we are initializing our coverage of Garrison Technology, a revolutionary provider of ultra-secure web browsing. Internet access for government employees presents one of the gravest threats to enterprise cyber security today. Company CTO Cyber Security News Security CompaniesCompromises on federal networks via spear phishing, watering hole attacks and drive-by-downloads permits cyber attackers ranging from criminals to nation states […].

Security Breech At The SEC Causes A Headache For Their CIO

The Accidental Successful CIO

In order to keep things under control and make sure that everyone behaves themselves, the government created the Securities and Exchange Commission (SEC). It turns out that the SEC has recently had a serious security breech. The SEC Wants To Check On Every Trade – Is This Safe To Do?

Recovering From a Security Breach

CTOvision

There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 203

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

All this leads to CIOs who are going through each day with a false sense of security. companies that have at least 500 employees rely on some form of security products in order to protect their networks.

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology. The post CIOs Are Racing To Deal With The Next Big Security Threat appeared first on The Accidental Successful CIO.

Windows Security Verticals – Digital Security Strategy

Anoop

The focus on Windows security verticals is changing very fast. Traditional security tools might have many challenges with modern technologies based on the cloud. You might need to revamp the digital security strategy. From this post, you will learn high-level details about Microsoft’s digital security strategy. Modern technologies could pose verity of new security challenges […]. Subscribe YouTube Channel [link].

2 security tricks your cloud provider won’t tell you

David Linthicum

Cloudops (cloud operations) and secops (security operations) are quickly evolving practices. While I’m seeing some errors, what’s more common is that ops teams are leaving important things out. If these missing aspects are not addressed, secops will become problematic quickly. Here are two secops omissions that you can deal with today, even though your public cloud provider won’t tell you about, won’t be on any certification, and is typically widely misunderstood. [