Insider threats have been around since the dawn of time, and they’ve always been a challenge to prevent and detect. That’s what makes reducing insider threat risk so difficult. The digital age, which has given much of the world’s population fast and easy access to information from practically anywhere, has only compounded the issue. In… Read More
Category: Cyber Security Strategy
How Can Vendor Security Assessments Improve Supply Chain Risk Management?
In today’s blog, we’ll take a look at the role of vendor assessments in supply chain risk management (SCRM). We’ll also offer some suggestions of where to start if you’re tasked with protecting your organization’s supply chain, your organization at large, or just curious to learn more about this aspect of cyber security. Why Is… Read More
You Got the CISO Job, Now What? 3 Tips to Start on Solid Ground
As a new Chief Information Security Officer (CISO) on the job, there is a sense of immediate urgency to show value and make an impact. Maybe you’re joining an organization that had some major problems before you arrived – a public incident, a challenging personnel situation, an unsatisfactory audit, etc. All eyes are on you,… Read More
How Cyber Security Exercises Can Keep You in Shape
Like regular physical exercise, exercising your cyber security muscles can be a good way to keep your information technology (IT) staff in cyber-shape. The purpose of cyber security exercises is to prepare and test a person or group to respond to a specific set of circumstances. Performing cyber security exercises can have some of the… Read More
Federal Agencies Moving to the Cloud Must Take Stock of Information Systems
Federal agencies moving to the cloud have a lot to consider, but a new guide from the Chief Information Officer (CIO) Council provides some useful advice. The Application Rationalization Playbook is designed to help IT portfolio managers at federal agencies figure out which applications can be smartly migrated to the cloud. It offers detailed advice for agencies to consider… Read More
Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster
We’ve just released a new feature in our ActiveEye platform that lets you visualize network activity in Amazon virtual private clouds (VPCs). In today’s blog we’ll discuss why we developed this capability. We will also explain how you can use it to detect potential security threats faster. DevOps teams are rapidly deploying applications to cloud environments. We… Read More