9 01, 2020

Top 5 Security Truths Every CIO Should Know – Part 1

2020-01-09T10:40:36-05:00January 9th, 2020|Categories: Expert Partner Content, Leadership, Security|Tags: , , , , , |

Provided By: NeuEon Connect with peers on this topic and others at the MIDMRKT CIO Forum. Anyone peeking into the mind of a CIO will see it swirling with challenging questions. A tornado of limited resources, balancing security and technology, and feeling alone in it all—obstructing the path to security success. What’s worse is that the [...]

7 12, 2019

CIO Decisions | Cyber Insurance

2019-12-07T13:47:11-05:00December 7th, 2019|Categories: Leadership, Security|Tags: , , |

As a CIO, I always struggled with the value of cyber insurance. The question of cost versus value kept me at a stalemate. On one hand, I was told that having this insurance was a must in case of a data breach, but on the other hand, it would be nearly impossible to prove [...]

20 11, 2019

Reality Check – What’s Up with WhatsApp?

2019-11-20T12:19:15-05:00November 20th, 2019|Categories: Blog, Security|Tags: , , |

In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review [...]

8 10, 2019

Big Data Analytics for Cyber? Combating the Zero Day Threat

2019-10-08T14:32:16-04:00October 8th, 2019|Categories: Data Analytics, Security|Tags: , , |

Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and [...]

2 10, 2019

The Gap in vCISO Services You Need to Know Now

2019-10-02T21:14:51-04:00October 2nd, 2019|Categories: Expert Partner Content, Security, Strategy|Tags: , , |

Provided By: NeuEon Connect with peers on this topic and others at the MIDMRKT CIO Forum. Can businesses afford to not have a CISO? It’s a complex question. On one hand, managing security risk is a core function of modern-day business, on the other, there’s the hefty $221,991 average CISO salary. Cost doesn’t stop there–companies often pay a [...]

9 08, 2019

MIDMRKT Featured Partner | Symantec

2020-01-05T16:29:18-05:00August 9th, 2019|Categories: Blog, Security|Tags: , |

  The MIDMRKT CIO Forum brings together top IT executives and solution providers in the midmarket space. These three days of collaboration, presentations, and networking are packed full of valuable conversations and new opportunities. One stand-out sponsor from the Spring 2019 CIO Forum was Symantec, who has proven to be a great partner for the MIDMRKT CIO [...]

18 03, 2019

MIDMRKT Local – Event Summary

2019-10-01T17:03:13-04:00March 18th, 2019|Categories: MIDMRKT Local, Security|Tags: |

In the new series MIDMRKT Local, Symantec and MIDMRKT Suite partner to bring together local IT executives for interactive discussions on cybersecurity. Thus far, we’ve met with nearly 100 executives in the following cities: Alexandria, Virginia Salt Lake City, UT Minneapolis, MN Milwaukie, WI Here’s a recap of what we’ve learned thus far! There [...]

4 03, 2019

Keeping Pace with Network Security and Compliance

2019-10-01T17:03:22-04:00March 4th, 2019|Categories: Networking, Security|Tags: , , |

In the next five to ten years, we can safely predict that industry and our daily lives will be further affected by game-changing innovations in technology. AI, machine-learning, virtual reality, IOT – all of these have and will continue to change the way we interact with customers, business partners, and even our close friends. [...]

22 03, 2018

Endpoint Cyber Security: Any Dwell Time Is Too Much

2018-03-25T14:43:21-04:00March 22nd, 2018|Categories: Security|Tags: , , |

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before they can do any damage. First, learn about attacks from some source and then reduce their dwell time by updating endpoint sensors or patching before a breach. In other words, [...]

25 10, 2017

Panelists Get Candid About Security Struggles

2017-10-25T15:01:33-04:00October 25th, 2017|Categories: Blog, Security|Tags: , , |

We’re in the midst of a societal shift. Because Internet users can now conveniently login to virtually any new website with their Facebook or LinkedIn credentials, employees expect the same seamless experience in the work place, and that social mentality is changing the way companies are treating corporate information. Leading executives and security providers got [...]

Go to Top