Security

CIO Decisions | Cyber Insurance

As a CIO, I always struggled with the value of cyber insurance. The question of cost versus value kept me at a stalemate. On one hand, I was told that having this insurance was a must in case of a data breach, but on the other hand, it would be nearly impossible to prove [...]

2019-12-07T13:47:11-05:00December 7th, 2019|Categories: Leadership, Security|Tags: , , |

Reality Check – What’s Up with WhatsApp?

In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review [...]

2019-11-20T12:19:15-05:00November 20th, 2019|Categories: Blog, Security|Tags: , , |

Big Data Analytics for Cyber? Combating the Zero Day Threat

Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and [...]

2019-10-08T14:32:16-04:00October 8th, 2019|Categories: Data Analytics, Security|Tags: , , |

The Gap in vCISO Services You Need to Know Now

Provided By: NeuEon Connect with peers on this topic and others at the MIDMRKT CIO Forum. Can businesses afford to not have a CISO? It’s a complex question. On one hand, managing security risk is a core function of modern-day business, on the other, there’s the hefty $221,991 average CISO salary. Cost doesn’t stop there–companies often pay a [...]

2019-10-02T21:14:51-04:00October 2nd, 2019|Categories: Expert Partner Content, Security, Strategy|Tags: , , |

MIDMRKT Local – Event Summary

In the new series MIDMRKT Local, Symantec and MIDMRKT Suite partner to bring together local IT executives for interactive discussions on cybersecurity. Thus far, we’ve met with nearly 100 executives in the following cities: Alexandria, Virginia Salt Lake City, UT Minneapolis, MN Milwaukie, WI Here’s a recap of what we’ve learned thus far! There [...]

2019-10-01T17:03:13-04:00March 18th, 2019|Categories: MIDMRKT Local, Security|Tags: |

Keeping Pace with Network Security and Compliance

In the next five to ten years, we can safely predict that industry and our daily lives will be further affected by game-changing innovations in technology. AI, machine-learning, virtual reality, IOT – all of these have and will continue to change the way we interact with customers, business partners, and even our close friends. [...]

2019-10-01T17:03:22-04:00March 4th, 2019|Categories: Networking, Security|Tags: , , |

Endpoint Cyber Security: Any Dwell Time Is Too Much

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before they can do any damage. First, learn about attacks from some source and then reduce their dwell time by updating endpoint sensors or patching before a breach. In other words, [...]

2018-03-25T14:43:21-04:00March 22nd, 2018|Categories: Security|Tags: , , |

Panelists Get Candid About Security Struggles

We’re in the midst of a societal shift. Because Internet users can now conveniently login to virtually any new website with their Facebook or LinkedIn credentials, employees expect the same seamless experience in the work place, and that social mentality is changing the way companies are treating corporate information. Leading executives and security providers got [...]

2017-10-25T15:01:33-04:00October 25th, 2017|Categories: Blog, Security|Tags: , , |

Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

The Question of Advanced Attack Protection – Reframed

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |