Accelerating Zero Trust Security – Part 1
How to prioritize your zero trust security initiatives We’re seeing major technological shifts such as work-from-home, automation, robotics, IoT, etc. accelerate due to the recent health and ensuing economic disruptions. Reality is that digitization was already facilitating these trends, and now CIO/CISOs must take the helm in enabling their organizations to make the transition toward […]
Is threat hunting a waste of time?
It can be unless you incorporate these strategies Many organizations are adopting regular cybersecurity threat hunting exercises as part of routine SOC operations. However, odds are that your threat hunting exercises aren’t very productive. The main reasons most threat hunting exercises are ineffectual range from the complexity of the threat landscape to lack of analytical/statistical […]
Is zero trust security an approach, architecture or new tech?
Yes—and how to unravel it for your organization Lately, the topic of zero-trust Security (ZTS) is one that we at CyberMSI have been discussing quite a bit with CIO/CISOs. In case you’re not familiar with ZTS, you can reference how the industry—and Microsoft in particular—defines ZTS here. Like so many of the other major shifts […]
Are you primed for success?
Why teaming successfully with your cybersecurity services provider is critical Henry Ford famously said, “Coming together is a beginning. Keeping together is progress. Working together is success.” This couldn’t be truer when it comes to your cybersecurity services provider. Easier said than done though considering that collaboration can be very challenging even between teams within […]
Is your team burning out?
Why incident management may be the problem If you’re reading this blog, odds are high that you don’t have to be convinced of the need to reduce the burnout resulting from working on a cybersecurity incident response (IR) team for even a short time. The only question is what to do about it. I’m going […]
Is your provider protecting you?
Why your cybersecurity services provider must do this Most managed detection and response (MDR) or managed security providers (MSP) claim to perform “response” services when a cybersecurity incident is identified. Their response typically comprises providing remediation steps or guidance that you as the customer will need to perform. That’s a problem. Not performing response activities […]
Struggling with Cybersecurity Strategy?
Why your cybersecurity strategy is probably inadequate and what you can do about it You’re not alone if you answered yes to the question. In my experience working with several CIOs and CISOs at Fortune 1000 over the years, I’ve seen a few great cybersecurity strategies—but mostly not so good ones. As cyberattacks become increasingly […]
- « Previous
- 1
- …
- 8
- 9
- 10