Moving to the cloud has many benefits, most of which are enthusiastically touted: greater scalability and storage options, and better visibility into business operations, to name just a few. Yet a move to the cloud doesn’t always mean blue skies— at least, not if you don’t have a guide to help you get the most out of your move. Cloud migration and optimization can create confusion. Though the flexibility and… Read More
Hiring & Retaining Cyber Security Talent is a Top Concern for CEOs
In a recent global survey, The Conference Board found that U.S. CEOs rank cyber security as their #1 external concern and acquiring/retaining talent as their #1 internal concern for 2019. With high-profile data breaches becoming more and more common, the fear is warranted. And for organizations looking to hire and retain cyber security experts, the intersection of these leading concerns is well, concerning. “As global competition increases while the pool of… Read More
7 Questions You Need to Be Able to Answer After a Cybersecurity Event
In the past 2 weeks, there have been three (more) high-profile cybersecurity breaches disclosed, impacting three very different organizations – and hundreds of millions of individuals worldwide. Marriott reported hackers have had access to the reservation systems of many of its hotel chains for the past four years, a breach that exposed private details of up to 500 million customers; Quora, the crowdsourced question and answer site, reported the potential exposure of 100 million users… Read More
Does your Disaster Plan Really Exist if you Never Test it?
Regardless of industry, when an unexpected event takes place and brings day-to-day operations to a halt, your organization needs to recover as quickly as possible and continue to provide services to its clients. From data security breaches to system disruptions to natural disasters, no business is immune to risk. Not having a disaster recovery plan in place can expose the organization to high financial implications, reputation loss and even greater… Read More
Aligning Security and Compliance on a Budget
Excerpts from NorCal CyberSecurity Summit on September 5, 2018; session presented by Shahin Pirooz, CTO/CISO of DataEndure. You can watch the full presentation here. More and more organizations and agencies are getting attacked on a daily basis, with newer threat vectors emerging faster than ever and even new business models developing to take advantage of the extremely lucrative cybercrime market. The city of Atlanta serves as a recent example (and warning)… Read More
To SIEM or not to SIEM?
From ransomware to DDoS attacks, companies are under siege. To effectively mitigate breach risk today requires enormous expertise, resources and budget. Companies are losing more each year on cybercrime than they are spending to prevent it. Security Incident and Event Management (SIEM) tools are one example of how organizations are attempting to combat the problem of cybercrime. A SIEM scans your network and provides visibility into suspicious/illegitimate activity. Unfortunately, as… Read More
Does Your Cloud Journey Feel Like an Episode of Survivor?
You’re not alone! In a recent Forbes article “Why The Cloud Is A Risky Business“, the author points out the complexities and struggles many companies face in their cloud transformation journey. The numbers speak for themselves – 77% of enterprises are thinking about making the jump to the cloud. The reality is businesses and vendors are traveling this road together, all inspired by the promises of this “brave new world”. While… Read More
Going on the Offensive Against Security Threats
In June, DataEndure participated in the Argyle CISO Leadership Forum panel, “Security Innovation; Unifying Proactive and Reactive.” Security leaders from across industries discussed the nature of insider threats, and where they are seeing the most opportunity for attacks – and innovation. This Executive Summary highlights the key themes and ideas that came out of the session. Time to Go on the Offense Historically, organizations (and vendors) have focused on reactive… Read More
Cyber-Response Fatigue: Relief in Sight
A recent article in Security Magazine highlighted a “clear and present danger” for many organizations today—that of cyber-response fatigue. In short, those tasked with securing their companies against IT risk are hitting their limits. With shrinking public tolerance for cybersecurity breaches and greater penalties for noncompliance in regulated industries (consider, for example, the GDPR that just went into effect), the heat and light on and from the boardroom have intensified dramatically. There is a fundamental… Read More
Enemy at the Gate?
Reflecting on the recent ransomware attack that shut down the city of Atlanta’s online systems, even weeks later, officials are still struggling to restore key services across the extensive service network. While details about the attack remain thin (and understandably so); authorities have confirmed the city experienced a ransomware cyberattack accompanied by a written demand for $51,000 in bitcoin. While this “hostage situation” played out, scores of government services came to a standstill,… Read More
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- Next Page »