Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cybersecurity Predictions: The Network Perimeter Will Be Reborn

The future of cybersecurity includes a major change to enterprise network perimeters. They are going to be reshaped into something new — micro-perimeters. This is the act of cordoning-off entire sections of systems in order to avoid major compromise when only one segment of the architecture is weak.

Cybersecurity Predictions: Effectiveness is measured by risk reduction

In the past, security technology wasn’t as regularly tested in the “real world” as it is today. That is, breaches are happening and being publicized at a far higher rate than ever before. There are seemingly multiple breaches a week. This means the security technology behind those breaches may get 15 minutes of undesired fame and the CSO gets a meeting with her boss. Going forward, security vendors will need to answer the question, “Does this security technology work?” Security stakeholders within an enterprise will answer the question, “Does this security technology work for me?”

Cybersecurity Predictions: Your phone matters more than your password

The password may be one of the worst security elements we have. They are oftentimes easily guessed because we, as humans, are generally pretty bad at creating and remembering them. So, we use weak passwords across multiple accounts. We use simple passwords like “123456” or “password.” The industry is also yet to find something better. The phone, however, presents new and exciting ways for companies to protect their accounts, which means the phone is also become a critical part of the hacker “kill chain.”

Webinar: Eliminating Negative Impact on User Experience from Security Solutions

In this session, you will hear security experts from SECDUE talk about reducing a negative impact on user experience from traditional security solutions. You will also learn about emerging technologies that enable you to protect financial, PII, and other sensitive information inside and outside of SAP, while eliminating a negative productivity impact.