Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Building a Distributed Security Team With Cjapi's James Curtis

Join Cribl's Ed Bailey and Cjapi's James Curtis as they discuss the challenges of building a distributed global security team. Talent is hard to find and companies are hiring all over the world to build the best teams possible, but this trend has a price. Traditional management processes do not work, from building culture to the basics around assigning, tracking and measuring work. Team leads and managers rarely have the experience and training to handle remote teams which can impact team effectiveness and thus weaken the enterprise security posture.

Cyber Resilience: The Key to Security in an Unpredictable World

This live stream is a conversation between Ed Bailey and Jackie McGuire on the growing significance of cyber resilience in today’s digital landscape. You’ll learn what cyber resilience means, why it’s important, and how to manage and improve it in an increasingly unpredictable world. With cyber threats becoming more sophisticated and frequent, cyber resilience has become critical to protecting personal and business assets.

Dealing with Unknown Threats

The cybersecurity threat landscape facing every organization is constantly changing. Cybercriminals are always looking for new vulnerabilities to exploit or changing existing attack methods to bypass protections. They also go to great lengths to hide their activities within regular network traffic and application activity. The attack surface that organizations present to attackers is also in a constant state of flux.

The Balancing Act of Staying Secure While Working From Home | Ivanti Security Insights Podcast: Ep.4

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Three Tech Options To Turbo-Charge Your New Construction Company

Launching a new company is a process that is going to leave you with more grey hairs than you started with. You will be putting everything that you have on the line, from your savings to your reputation, but it will all be worth it when that gamble on yourself pays off. Heading into the construction industry is always going to be an uphill struggle, as you will be competing against established firms with long-standing ties to clients. But you will have flexibility on your side, and the chance to incorporate new tech from day one.

7 Ways to Prevent Network Security Breaches in the Workplace

Network security breaches are every business’s nightmare. A security breach could be anything from password attacks with further unauthorized system access to data leakage. Whether it is a small start-up or a large enterprise with millions of dollars in turnover, a single network security breach can be detrimental to the reputation of any company, not to mention the financial losses incurred. According to the 2021 Thales Data Threat Report, 45% of US companies suffered a data breach in 2020.

Why is EDR Important? A Business Case for MSPs

The security industry may not have been making a lot of noise about Endpoint Detection and Response (EDR) for long, but it’s not actually a new technology. Despite having been around now for roughly 10 years, it’s only recently that EDR has really come to the fore. This has been driven by the fact that traditional antivirus struggles to cope with the increasing sophistication of modern malware, and is certainly unfit to handle new types of cyber threats.

Top 5 Managed Detection and Response Services and How to Choose

Managed Detection and Response (MDR) is an approach to cybersecurity that combines advanced technologies, skilled analysts, and a proactive response process to detect, investigate, and remediate cyber threats. MDR is typically delivered as a service by a third-party provider and includes a range of security capabilities, such as threat intelligence, behavior analysis, anomaly detection, and incident response.