Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protect Sensitive Data When Working With Partners and Contractors

The Lookout security platform allows users to successfully collaborate with partners and vendors while keeping confidential information secure. With data loss prevention and dynamic digital rights management, users can securely collaborate with tools like Microsoft Teams, Slack, and email.

Zero Trust Summit Fireside Chat with Jim Dolce

Jim Dolce was featured on a moderated main stage discussion, alongside Francis Rose, at the Zero Trust Summit in Washington, D.C. This engaging conversation examined how to secure the edge to meet OMB Zero Trust requirements. The event gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust.

Work and Life Have Intertwined: Why You Need to Protect Against Phishing on Both Fronts

Don't bring your personal life into the office; don't bring your work stuff home — these were already difficult tasks prior to the 2020 pandemic. Now, with hybrid work settling in, they have become nearly impossible to achieve. Where we work is no longer tethered to a static location. From the Wi-Fi we connect to, to the devices we use for work, our personal and professional lives are now closely intertwined.

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

After a two-year hiatus, the Gartner Security and Risk Management, London is back! I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies, including the Top Cybersecurity Predictions for 2022-2023 from Gartner. Two themes that stood out to me were security service edge (SSE) and extended detection and response (XDR) Below are some of my key takeaways from this year’s conference.

My Journey Beyond the Perimeter: Why Firewalls Alone Can't Protect Your Data

My first interaction with a firewall was with a TIS Gauntlet that I compiled on a Sun workstation in 1994. Since then, I have worked with firewalls from Checkpoint (back when configuration files were clear text flat files and they only had support out of their headquarters in Israel), Raptor, Pix (when they booted from a 3 ¼” floppy), and finally the Cisco ASAs, FortiGates, and Palo Alto firewalls of today.

Persistence and Patience: Two Qualities You Don't Want Your Ransomware Attacker to Have

Modern organizations are built on data. It enables collaboration and helps us engage with customers. But that same helpful data is also sprawled across countless apps, making it difficult to secure. Ransomware attacks are on the rise — 57% of security leaders expect ransomware to compromise their organization within the next year — which makes data protection more essential than ever.

Why Your Cloud Migration Is Causing Security Risk

You've migrated to the cloud, which has made you more efficient and agile. But this comes with new security challenges. Your data is outside your corporate network: In public clouds, on personal devices, on unsanctioned apps, and handled by networks you don't own. The more spread out your data is, the less visibility and control you have.

Fortify Your SD-WAN With SSE Integration

Many of today’s security tools are built to secure cloud services. But we need to keep in mind that many organizations still require configurations that don’t have direct connection to the cloud. Organizations that have numerous branch locations — like convenience stores, school districts and banks — often use a software-defined wide area network, or SD-WAN.

Protecting K-12 Student Data and Complying With Privacy Standards Requires a Comprehensive Security Solution

The education systems, including K-12 school institutions, are in the crosshairs of increasingly frequent and sophisticated cyberattacks. In just one month of 2021, educational organizations suffered more than 5.8 million malware incidents. Teachers, administrators and students are also targets as they use various devices such as laptops and smartphones to browse social media or send messages with friends and family.