_Experts-Applications

What IT and Security Should Be Asking Themselves in 2019

IT and workforce digitization is not only changing businesses but whole industries — virtually overnight. Don Boxley, co-founder of DH2i, outlines the top two questions every IT and business professional tasked with digitization and/or data security should ask themselves in 2019, plus the two top questions to ask when investing in new technology solutions.

You Can't Manage What You Can't Measure. Raise Your DevOps IQ

DevOps is an outcome-based practice for organizations and helps them achieve rapid application delivery. However, it is important to measure and achieve more as you progress in your DevOps journey. Prasanna Singaraju, Co-Founder and Chief of Engineering and Technology at Qentelli, helps you get a greater view of how DevOps with KPIs will change the way your business operates and becomes more efficient.

Is the Cyber World Really Less Secure Than a Few Years Ago?

Looking back to identify trends and patterns, we can see what lessons we can learn when it comes to patch management. Chris Goettl, director of product management, security at Ivanti, reviews what we saw throughout 2018 and also some trends across the last decade. From this he provides some guidance as to what you should be working toward to make your cybersecurity program successful.

How NAC and CIS Controls Go Hand-in-Hand

For midsize companies, the best practices outlined in the “First 5 CIS Controls” provide a solid foundation for securing their IT environments and reducing their level of exposure to the vast majority of security threats. Ofer Amitai, CEO and co-founder of Portnox, discusses how NAC provides coverage for these controls.

Better Make Some Plans When Moving To The Cloud

As organizations shift more to the cloud, it means they will increasingly rely on networks and infrastructure they don't own or directly manage. Yet this infrastructure is just as critical to consume and deliver the applications and services as when it was in the data center. Alex Henthorn-Iwane, VP Product Marketing at ThousandEyes, outlines 6 key network considerations that IT managers should take into account before shifting to the cloud.

How AI and Quality Engineering Improve Business Systems

DevOps is about more than continuous delivery. Prasanna Singaraju, Chief of Engineering and Technology at Qentelli, explains how AI can help fill in the potential gaps to improve application quality and delivery speed as well as user satisfaction.

The Benefit of a Software-Defined Perimeter

This article introduces the concept of a Software Defined Perimeter (SDP) as a progressive security model. Don Boxley, co-founder and CEO of DH2i, explains how an SDP overcomes today’s most prevalent data security challenges – especially as cloud adoption continues to soar – while presenting numerous, previously unattainable benefits.

How Secure Is Your Social Login?

To address the rising tide of data breaches, social network providers have enhanced their built-in security and have focused primarily on improving multi-factor authentication processes. To better understand what varying platforms offer, Ehud Amiri, senior director for product management at OneLogin, looks at how the leading social media sites are protecting their users.

Gamification: The ‘Secret Sauce’ For Your Software Security Program

With security often seen as an obstacle in the path of innovation, adhering to project delivery deadlines and staying agile, it can be something of a dirty word in the software industry. Pieter Danhieux, CEO of Secure Code Warrior, explains how to engage developers to code securely, bridge the gap between the development and security functions of the business, and strive for a higher build standard of software.

Productivity or Cybersecurity? Now You Can Have Both

When it comes to protecting end-user devices, many enterprises see two choices: either lock down devices and limit what users can access, or prioritize productivity and take some chances with security. Tal Zamir shows why this either/or proposition is untenable for CISOs, IT and end-users, and how a new software-defined endpoint approach is enabling enterprises to deliver completely secure and totally unrestricted user experience.

6 Reasons Why SIEMs Aren’t a Security Analytics Tool

Given all the vendor- and analyst-speak in the security space, it’s become difficult for organizations to know the difference between Security Information and Event Management (SIEM) and security analytics. Here are 6 ways to tell a SIEM from a security analytics product.

Organizations Cannot Keep Up With Software Patches

99% of successful attacks involve vulnerabilities that have been known to cybersecurity professionals for at least one year. Nollaig Heffernan describes the issues that exist today with applying software patches, primarily at the application layer, and advises on how to mange the patching effort and where priorities should lie for organizations.

2018 Patch Status: Complex Updates But Limited Attacks

We kicked off 2017 with a lot of excitement around a nasty set of SMB vulnerabilities which led to the devastatingly successful WannaCry and NotPetya attacks, and 2018 started off with a similar level of excitement concerning the Spectre and Meltdown vulnerabilities. Ivanti’s Chris Goettl discusses which trends have surfaced and what to watch for during the rest of the year.

The Threats That Are Keeping CISOs Up At Night

RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.

Sorry, It's A Myth That Macs Are More Secure Than PCs

While Mac users like to believe that their systems are secure, the truth is that Macs really aren't more secure than Windows PCs; it's a myth that Apple computers are inherently more secure and don't get malware. Here are several things that Mac users can do to improve their security.

Mobile Apps, Your Data, and your digital Shadow

Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.

How To Build A Security-Driven Organization - The Human Element

Despite the advances in technology, there’s still a very human element to whether a company embraces security practices. This article examines the impact that organizational culture has on a company's ability to adopt a security-driven mindset and offers some pragmatic tips on overcoming oft-encountered challenges.

It’s Better To Bring Messaging Apps Out Of The Shadows

Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.

Citizen Development - It’s Everywhere, Unstoppable, And Good - Part II

Software tools that empower employees to create and automate workflows should be easy to use. Plain and simple: They are not programming utilities. And they should not look like programming utilities.

Citizen Development - It’s Everywhere, Unstoppable, and Good

Citizen development – when non-programmers create useful software solutions – is excellent for driving business productivity.It lets employees that own business problems to own – and build – business solutions. Unlike with software written by a company’s IT developers or outside contractors, citizen development involves a minimum of red tape and funding, gets directly to the heart of what the employee was trying to accomplish, and can make lots of people happy. If it’s done right.