Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Your Cloud Migration Is Causing Security Risk

You've migrated to the cloud, which has made you more efficient and agile. But this comes with new security challenges. Your data is outside your corporate network: In public clouds, on personal devices, on unsanctioned apps, and handled by networks you don't own. The more spread out your data is, the less visibility and control you have.

SANS Protects: The Network

SANS Protects is a series of papers focused on the most prevalent threats to specific, critical components of your environment as well as actions you can take to mitigate those threats and thwart threat actors. In this webcast, sponsored by Corelight, SANS Certified Instructor Matt Bromiley will examine current, prevalent network threats and how adversaries use them to take advantage of, and maintain footholds in, victim environments.

Introducing Keeper MSP Upgraded Billing Platform

Keeper has updated our MSP platform and licensing to be much more flexible. This allows managed service providers and their managed companies to allocate Keeper licenses to their users and pay for those licenses at the end of the month. While other MSP solutions in the market bill upfront before licenses are allocated to users, Keeper’s new billing model is designed to scale with your MSP business as you add individual managed companies and users.

SOAR Market Guide 2022: What does the Gartner research say?

While Gartner hasn’t released the SOAR Magic Quadrant, to the delight of many SOAR enthusiasts, the highly anticipated Gartner SOAR Market Guide for 2022 is out and we are happy to announce that Sumo Logic has been included again! Even though Security Orchestration, Automation and Response (SOAR), as a relatively new security category, doesn’t have a SOAR Magic Quadrant, Gartner is already dedicating a market guide for SOAR solutions.

What is a Good HECVAT Score?

The HECVAT (Higher Education Community Vendor Assessment Toolkit) is a security assessment framework in the form of a questionnaire that’s specifically designed for higher education institutions to measure vendor risk. HECVAT attempts to standardize higher education information security and data protection requirements for cloud service providers and third-party solutions, specifically for their consistency, compatibility, and ease of use.

Bring a Healthy Dose of Skepticism ..... Please

We are asked to purchase something 4,000 times every day; that’s roughly once every 13 seconds during our waking hours. These “requests to purchase'' often come in the form of marketing messages that test the bounds of credibility. In the software industry, most of us have trained ourselves to question vendor promises vociferously.

What is the Difference Between Compliance and Auditing in Information Security?

Global information technology (IT) spending on devices, data center systems/software, and communications services reached $4.26 trillion in 2021 and is expected to increase to around 4.43 trillion U.S. dollars at the end of 2022. With this new, skyrocketing growth, organizations face complex new compliance and IT security challenges in how data and information are stored.

Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey

Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – which we have undertaken for the second year running and expanded into other regions including the UK, USA and Australia, shows strong signs that cybersecurity automation adoption is advancing, but 97% of respondents say they have experienced problems during implementation.