Monday 9/26
Benefits of an Insider Threat Management Program (Proofpoint)
The success of an ITM program is completely dependent upon involving stakeholders beyond IT and information security. Since anyone in your organization could become a source of insider challenges, you need representation from all parts of your organization.
https://bit.ly/3Rg23Ob
Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level (Check Point)
Check Point’s Mid-Year Report recently revealed a 42 percent global increase in cyberattacks and ransomware is now the number one threat to businesses.
https://bit.ly/3R9JtqJ
Tuesday 9/27
5 Cybersecurity Tips to Keep Your Business Protected (Fortinet)
As the rate of cyber threats increases and attackers develop more sophisticated strategies, it is more important than ever that businesses take a proactive and adaptative approach to cybersecurity through AI-assisted data management.
https://bit.ly/3Sdy8HA
2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow’s Adversaries (CrowdStrike)
The CrowdStrike 2022 Falcon OverWatch Threat Hunting Report examines the trends that dominated the past year, digs deeper into novel and interesting examples of adversary tradecraft, and looks ahead at how and where threats are evolving.
https://bit.ly/3ShJv1n
Wednesday 9/28
5 Defense-in-Depth Layers for Enabling Secure Access (CyberArk)
Whether you see a need to better secure the SSH keys of third-party privileged users or shared app account passwords of everyday employees, it’s time to start thinking more holistically about protecting identities of all types, in all use cases, across the entire lifecycle.
https://bit.ly/3DVmdtM
Why IOPS Don’t Matter (Pure Storage)
The commonly accepted measure of performance for storage systems has long been IOPS, but this isn’t the best measure.
https://bit.ly/3UL343H
Thursday 9/29
6 essential steps for planning a hybrid cloud migration (Citrix)
Taking on a hybrid cloud approach to deliver virtual apps and desktops to users anywhere has been imperative for organizations looking to accelerate their digital transformation while still being secure.
https://bit.ly/3BRExBf
Varonis Adds Secrets Discovery for On-Prem and Cloud Data Stores (Varonis)
Secrets, like passwords and tokens, are the keys to your most important apps and infrastructure. They keep intellectual property, source code, and the infrastructure of your business safe. But in the wrong hands, this information could cause a lot of damage.
https://bit.ly/3fuBRSL
Friday 9/30
Securing Apps and APIs Everywhere: Why and How (F5)
When you begin to consider the magnitude and complexity of this type of digital environment—the volume of APIs and microservices necessary to make this environment function seamlessly and delight customers—the magnitude and complexity of the app security challenge begins to emerge.
https://bit.ly/3RFcRWp
Cybersecurity Awareness Month: The Importance of Enabling MFA
For 2022, CISA has created the theme, “See Yourself in Cyber,” and are highlighting four actions (that’s one per week) you can take to improve your security awareness and keep yourself safer online!
https://bit.ly/3UQyHZH