Zephyrnet Logo

Tag: Executive Insight

Three answers to the cybersecurity skills gap

By this point, every organization that needs a skilled team of cybersecurity professionals knows about the skills gap. Companies in all industries are fishing for...

The four levels of automated remediation

Automated remediation of cloud misconfigurations was a big theme in 2018, and here at DivvyCloud we expect the trend to continue through 2019....

Inside the weakest link: How good and bad actors view endpoint security

There’s no silver bullet when it comes to endpoint security. No matter how many security tools enterprises layer on, or how locked-down user devices...

Cracking the code on cloud security for higher education

The migration of database and application infrastructure to the cloud is now taking center stage for both private and public sectors as organizations seek...

Cyberinsurance: The value from an incident response lens

Cyberinsurance is not new to the scene, and an increasing number of organizations are accepting its critical role in safeguarding them against costly cybersecurity...

Malproxying: Leave your malware at home

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint...

Spoiler alert: Attack simulation isn’t ethical hacking

Everything you wanted to know about Breach and Attack Simulation (BAS) vs. Automated Penetration Testing Better prepared, Right!? Companies are investing...

The evolution of shared responsibility in cloud security

Businesses are conflicted about moving their data to the cloud. Some claim that one of the main reasons for moving data to the cloud...

How to spot common business email compromise tax scams

There are many different types of Business Email Compromise (BEC) attacks, but the smartest and most likely to succeed are often timed to coincide...

Detecting malware patterns with cutting-edge graph search tools

This past July, Capital One was hit by one of the largest financial hacks in history, impacting the personal data of over 100 million...

Red and blue teams have changed — Here’s how your security strategy can keep up

The long-held rivalry between red and blue teams has served a beneficial purpose, simulating the highly competitive real-world environment between hackers and those defending organizations....

Confidential Computing: The confidentiality of data in business is at peak recognition

he challenge of protecting data in use is becoming more and more urgent as data leaks continue unabated. This urgent need is...

Latest Intelligence

spot_img
spot_img