Security News
In this podcast recorded at RSA Conference 2020, we're joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. We are here today with the ThreatQuotient team to talk about all things security operations, the human element of cybersecurity, and the evolving landscape of threat intelligence.
The common practice in recent years is to gain extra protection through implementing either EDREPP solutions or Network Traffic Analysis/NDR solutions. A recently published guide, 'Advanced Threat Protection Beyond the AV' is the first resource that not only guides security executives through the pros and cons of each solution type but also outlines a best-practice approach that allows the "Non-Fortune 500" companies to combine the advantages of both approaches - without actually buying both.
The Advanced Threat Protection Beyond the AV guide guides security executives through the pros and cons of each solution type, and also outlines a best-practice approach that allows companies to combine the advantages of both approaches - without actually buying both. The Advanced Threat Protection Beyond the AV guide dives deep to explain the differences between the endpoint and network-based approaches, specifying the pros and cons of each and leading to the conclusion that the best protection against cyberthreats entails combining the capabilities of both approaches.
Sameer Malhotra of TrueFort on Filling XDR Visibility GapsMoving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to...
Hal Lonas of OpenText Shares Cybersecurity PredictionsWebroot just released its 2020 Threat Report. How has the landscape changed, and what cybersecurity predictions are made for 2020? Hal Lonas...
Careless and malicious insiders, overly complex IT infrastructure and having an excess of privileged users continue to pose serious risks to the integrity of corporate cybersecurity practices, says Timothy Brown of SolarWinds. The most important steps that IT and security professionals should be taking now to protect their organizations.
What role can technology now play in improving insider threat detection and response? Three CISOs share their insights. Joining ISMG's Tom Field to discuss insider threat are: Dawn Cappelli, vice president of global security and CISO of Rockwell Automation; Sujeet Bambawale, CISO of 7-Eleven; Solomon Adote, chief security officer of the state of Delaware; and Tony Pepper, CEO and co-founder of Egress Software Technologies.
Acronis, a global leader in cyber protection announced at RSA Conference 2020 several advances in the company's modern cyber protection approach. As a result, an organization's data, applications, and systems are prime targets for cyberattacks - and since modern cyberthreats target backup files and systems, data, applications and systems need to be protected by proven data protection solutions that also integrate cutting-edge security capabilities.
SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE's synthetic malware creation platform to trusted third party developers so that they can turn their experience and expertise into new capabilities for a vibrant security ecosystem.
In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria.