Expert analysis
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …
To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …
Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …
Supply chain shortages create a cybersecurity nightmare
The White House has recently issued alerts noting that many manufacturers suffer from disrupted supply chains, and rebuilding supply chains is a major priority. Some analysts …
Securing IoT from the ground up
We live in a highly connected world. There are already approximately 10 billion connected Internet of Things (IoT) devices, and their number is expected to grow to over 25 …
Log4Shell: A retrospective
Now that the dust has settled on both the holiday season and the Log4j vulnerability that saw many of us working through it (CVE-2021-44228), it makes sense to look back and …
Democratizing security with Open XDR
There is no denying the notion of strength in unity. Similarly, inclusiveness and the broad participation of many is another idea that is widely cherished. These are both …
Cloud security training is pivotal as demand for cloud services explode
Change is afoot. The private, public and third sector are transitioning from on-premises and datacenter-hosted infrastructure to hybrid architectures utilizing …
Tips to mitigate public-key cryptography risk in a quantum computing world
Quantum computing is poised to transform the industry over the next decade. With its promise of breakthrough speed and power, it’s easy to understand why there is so much hype …
Low code applications are essential for cybersecurity development in applications
One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …
Why security strategies need a new perspective
After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …
Why cybersecurity and anti-fraud teams need to collaborate
Over the past couple of years, there has been unprecedented change in the world of financial services. The shift to online banking has accelerated the need for digital …