_Experts-Systems

Better Make Some Plans When Moving To The Cloud

As organizations shift more to the cloud, it means they will increasingly rely on networks and infrastructure they don't own or directly manage. Yet this infrastructure is just as critical to consume and deliver the applications and services as when it was in the data center. Alex Henthorn-Iwane, VP Product Marketing at ThousandEyes, outlines 6 key network considerations that IT managers should take into account before shifting to the cloud.

How The CTO Became The New Chief Privacy Officer

It is impossible for privacy professionals using manual, survey-based approaches to stay on top of an environment of ever-changing data and these days, the CTO is increasingly being tasked with operationalizing their companies’ data privacy solution. Kristina Bergman, CEO and co-founder of Integris Software, outlines four recommendations for CTOs when it comes to Data Privacy Automation.

8 Security Operations Center Essentials

Whether you’re building a security operations center or ensuring that your existing security operations team has all its bases covered, you must ensure that you’re properly protecting your digital assets. Jorge Alago, cybersecurity architecture lead at Veristor, provides a quick rundown of 8 essential components that should be core to your security efforts.

The Benefit of a Software-Defined Perimeter

This article introduces the concept of a Software Defined Perimeter (SDP) as a progressive security model. Don Boxley, co-founder and CEO of DH2i, explains how an SDP overcomes today’s most prevalent data security challenges – especially as cloud adoption continues to soar – while presenting numerous, previously unattainable benefits.

Productivity or Cybersecurity? Now You Can Have Both

When it comes to protecting end-user devices, many enterprises see two choices: either lock down devices and limit what users can access, or prioritize productivity and take some chances with security. Tal Zamir shows why this either/or proposition is untenable for CISOs, IT and end-users, and how a new software-defined endpoint approach is enabling enterprises to deliver completely secure and totally unrestricted user experience.

Blockchain Systems Need Mature Disclosure Policies

Decentralized systems based on technologies such as Blockchain must take into consideration the safety of the security researcher and provide the means to report vulnerabilities anonymously. And because flaws are inevitable, companies working in this space must have a mature, responsible disclosure policy.

What Is A Next-Generation Firewall And Why Do We Need It?

The most effective first level of physical defense in your network architecture’s security infrastructure is the firewall. Yoram Ehrlich, VP Products at Niagara Networks, explains how there is now a clear shift toward next-generation firewall (NGFW) technology incorporating advanced know-how.

The Threats That Are Keeping CISOs Up At Night

RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.

Sorry, It's A Myth That Macs Are More Secure Than PCs

While Mac users like to believe that their systems are secure, the truth is that Macs really aren't more secure than Windows PCs; it's a myth that Apple computers are inherently more secure and don't get malware. Here are several things that Mac users can do to improve their security.

Two Is Usually Better Than One, But With 2FA It Might Not Be

A new strain of mobile malware, known as FakeBank, has been discovered by security researchers from Trend Micro. The new malware has been found in several SMS/MMS management software apps and is designed to steal banking information and funds. How do you detect these fraudulent transactions before they create a financial nightmare consumers and companies?

Mobile Apps, Your Data, and your digital Shadow

Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.

Spectre And Meltdown Vulnerabilities. Happy New Year!

Intel has confirmed findings by researchers (including from Google’s Project Zero) that the design of chips from Intel, AMD and ARM has – for more than a decade – permitted hackers to access memory on billions of business and consumer devices. So what, you ask? This is what.

It’s Better To Bring Messaging Apps Out Of The Shadows

Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.

KRACK Happens: How Bad Is The Vulnerability? What To Do?

A new vulnerability was recently exposed and a proof of concept for an exploit was demonstrated alongside of it, highlighting again just how delicate the Internet really is. This time, the vulnerability impacts a protocol used across a variety of devices, taking aim at both business and end user systems—as well as data. Here’s what we know thus far.

Ready To Connect, But Is Your IP PBX Secure?

VoIP and IP PBXs bring multiple benefits to businesses: from slashing telco costs, to increasing productivity, to boosting overall efficiency within the workplace. However, where there are pros there are almost always cons. It’s apparent that vendors and users need to become more attentive with regard to the potential risks involved when using IP for communications and actively undertake precautions to prevent being hacked.

Grant Access to Workflows, Not to Systems or Data

It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.

To Win The Cyber War We Must Explore Alternative Realities

At this point, it should seem clear we are losing the cyber war. Digital security is getting worse because of lock-in. So how is this impacting our security posture? Jamison Utter explains.

Legacy Tech: Someone or Something Might Be Lurking in The Shadow

Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.

The Risk of Hanging on to Obsolete Technologies

Over the past several years, we’ve been hearing more about companies that want to expose their environments through open APIs, integration with hybrid cloud technologies, and the Internet of Things (IoT). As a response to this trend, your business is going to demand more from you during this time of digital transformation.

Expert Demetrios "Laz" Lazarikos socializes several ideas to assist you with your IT and Information Security decisions moving forward.