Threat Risk Through IAM image

Reducing Insider Threat Risk Through IAM

Insider threats have been around since the dawn of time, and they’ve always been a challenge to prevent and detect. That’s what makes reducing insider threat risk so difficult. The digital age, which has given much of the world’s population fast and easy access to information from practically anywhere, has only compounded the issue. In… Read More

CISO job

You Got the CISO Job, Now What? 3 Tips to Start on Solid Ground

As a new Chief Information Security Officer (CISO) on the job, there is a sense of immediate urgency to show value and make an impact. Maybe you’re joining an organization that had some major problems before you arrived – a public incident, a challenging personnel situation, an unsatisfactory audit, etc. All eyes are on you,… Read More

How Cyber Security Exercises Can Keep You in Shape

How Cyber Security Exercises Can Keep You in Shape

Like regular physical exercise, exercising your cyber security muscles can be a good way to keep your information technology (IT) staff in cyber-shape. The purpose of cyber security exercises is to prepare and test a person or group to respond to a specific set of circumstances. Performing cyber security exercises can have some of the… Read More

Federal Agencies Moving to the Cloud

Federal Agencies Moving to the Cloud Must Take Stock of Information Systems

Federal agencies moving to the cloud have a lot to consider, but a new guide from the Chief Information Officer (CIO) Council provides some useful advice. The Application Rationalization Playbook is designed to help IT portfolio managers at federal agencies figure out which applications can be smartly migrated to the cloud. It offers detailed advice for agencies to consider… Read More

Visualize network activity in Amazon virtual private clouds

Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster

We’ve just released a new feature in our ActiveEye platform that lets you visualize network activity in Amazon virtual private clouds (VPCs). In today’s blog we’ll discuss why we developed this capability. We will also explain how you can use it to detect potential security threats faster. DevOps teams are rapidly deploying applications to cloud environments. We… Read More