Don’t Let Complexity Get the Best of You

Computer networking has always evolved at a rapid pace, but it seems to be accelerating at a far greater rate today, resulting in unprecedented challenges for network security managers. The advent of the Internet has brought unprecedented access and the cloud has increased the speed of development and delivery. Now, containers and microservices provide the…

Details

Stopping the cat-and-mouse game

If I were a cyber attacker, I wouldn’t go after just any user. I’d target privileged users. They are the people who hold the keys to the kingdom, so to speak – the sensitive information, the crown jewels. They have supervision and control over the enterprise’s servers, endpoints, databases, and customer and employee information. And…

Details

Shifting Your Cybersecurity Strategy to Stop People-Centric Threats

Keeping companies safe from determined cybercriminals is an everyday battle as threats continue to evolve and business practices change. For many security teams, the question remains: What steps should organizations take today, and what should they anticipate tomorrow? According to Bhagwat Swaroop, EVP of email security for global cybersecurity company Proofpoint, the threat landscape has…

Details

How to Write a Great CISO Resume – Know What to Include

Managing Partner, Caldwell Partners The Chief Information Security Officer (CISO) job has changed significantly in the last couple of years. It has historically been more of a lower-level, tactical IT job, but now has become a higher-level strategic, business-oriented role around enterprise risk management. With that shift in the job responsibilities, the specifications have changed,…

Details

Five Ways that Cloud Delivered SD-WAN Can Improve Enterprise Security

Many enterprises are looking for ways to decrease the strain on their wide area network (WAN) architecture. Traditional hub and spoke network designs simply can’t meet the rigorous demands of cloud and mobile computing and the need to provide good user experiences for people in branch and remote locations. Organizations are finding a flexible solution…

Details

The Road to Breach Recovery: The first step is to admit you have data

There are a handful of steps, many common sense, that companies should take following a data breach. Naturally, following an established remediation plan, understanding what happened, and initiating an investigation around a breach are critical incident response steps. Adopting a data-centric frame of mind when it comes to security shouldn’t be too far down a…

Details

Break the Trust and Stop the Breach: The Zero Trust Security Model

As 2018 is upon us, it’s time to take stock of our new realities and commit to better behavior that benefits us and our companies. The discussion of the perimeterless enterprise is not new. In fact, the term “de-perimeterisation” was coined by Jon Measham, a former employee of the UK’s Royal Mail in a research paper, and subsequently…

Details