Security

Big Data Analytics for Cyber? Combating the Zero Day Threat

Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and [...]

2019-10-08T14:32:16-04:00October 8th, 2019|Categories: Data Analytics, Security|Tags: , , |

The Gap in vCISO Services You Need to Know Now

Provided By: NeuEon Connect with peers on this topic and others at the MIDMRKT CIO Forum. Can businesses afford to not have a CISO? It’s a complex question. On one hand, managing security risk is a core function of modern-day business, on the other, there’s the hefty $221,991 average CISO salary. Cost doesn’t stop there–companies often pay a [...]

2019-10-02T21:14:51-04:00October 2nd, 2019|Categories: Expert Partner Content, Security, Strategy|Tags: , , |

MIDMRKT Local – Event Summary

In the new series MIDMRKT Local, Symantec and MIDMRKT Suite partner to bring together local IT executives for interactive discussions on cybersecurity. Thus far, we’ve met with nearly 100 executives in the following cities: Alexandria, Virginia Salt Lake City, UT Minneapolis, MN Milwaukie, WI Here’s a recap of what we’ve learned thus far! There [...]

2019-10-01T17:03:13-04:00March 18th, 2019|Categories: MIDMRKT Local, Security|Tags: |

Keeping Pace with Network Security and Compliance

In the next five to ten years, we can safely predict that industry and our daily lives will be further affected by game-changing innovations in technology. AI, machine-learning, virtual reality, IOT – all of these have and will continue to change the way we interact with customers, business partners, and even our close friends. [...]

2019-10-01T17:03:22-04:00March 4th, 2019|Categories: Networking, Security|Tags: , , |

Endpoint Cyber Security: Any Dwell Time Is Too Much

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before they can do any damage. First, learn about attacks from some source and then reduce their dwell time by updating endpoint sensors or patching before a breach. In other words, [...]

2018-03-25T14:43:21-04:00March 22nd, 2018|Categories: Security|Tags: , , |

Panelists Get Candid About Security Struggles

We’re in the midst of a societal shift. Because Internet users can now conveniently login to virtually any new website with their Facebook or LinkedIn credentials, employees expect the same seamless experience in the work place, and that social mentality is changing the way companies are treating corporate information. Leading executives and security providers got [...]

2017-10-25T15:01:33-04:00October 25th, 2017|Categories: Blog, Security|Tags: , , |

Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

The Question of Advanced Attack Protection – Reframed

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |

Top 5 cybersecurity challenges for the midmarket

For years, midmarket companies had the luxury of not being the primary target of cyberattacks. Recent events, like the rapid spread of the WannaCry ransomware, show that SMBs can no longer rely on larger targets attracting the attention of hackers. Network security costs $178,000 a year for a typical mid-tier business, and this average budget [...]

2017-08-17T11:32:24-04:00August 17th, 2017|Categories: Security|Tags: , , , , |

The General Data Protection Regulation: What It Means and How Data Management Can Help

You're well aware of the feeling of dread that comes over someone when he or she hears that a company's store of personal data has been breached. They immediately start imagining worst-case scenarios. What have the hackers gotten access to – Social Security numbers? Credit card info? E-mail addresses? Dates of birth? The compromised company [...]

2017-08-22T13:48:50-04:00August 15th, 2017|Categories: Data Analytics, Security|Tags: , , |