Top 5 Security Truths Every CIO Should Know – Part 1

Provided By: NeuEon Connect with peers on this topic and others at the MIDMRKT CIO Forum. Anyone peeking into the mind of a CIO will see it swirling with challenging questions. A tornado of limited resources, balancing security and technology, and feeling alone in it all—obstructing the path to security success. What’s worse is that the [...]

2020-01-09T10:40:36-05:00January 9th, 2020|Categories: Expert Partner Content, Leadership, Security|Tags: , , , , , |

CIO Decisions | Cyber Insurance

As a CIO, I always struggled with the value of cyber insurance. The question of cost versus value kept me at a stalemate. On one hand, I was told that having this insurance was a must in case of a data breach, but on the other hand, it would be nearly impossible to prove [...]

2019-12-07T13:47:11-05:00December 7th, 2019|Categories: Leadership, Security|Tags: , , |

Reality Check – What’s Up with WhatsApp?

In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review [...]

2019-11-20T12:19:15-05:00November 20th, 2019|Categories: Blog, Security|Tags: , , |

Big Data Analytics for Cyber? Combating the Zero Day Threat

Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and [...]

2019-10-08T14:32:16-04:00October 8th, 2019|Categories: Data Analytics, Security|Tags: , , |

MIDMRKT Featured Partner | Symantec

  The MIDMRKT CIO Forum brings together top IT executives and solution providers in the midmarket space. These three days of collaboration, presentations, and networking are packed full of valuable conversations and new opportunities. One stand-out sponsor from the Spring 2019 CIO Forum was Symantec, who has proven to be a great partner for the MIDMRKT CIO [...]

2020-01-05T16:29:18-05:00August 9th, 2019|Categories: Blog, Security|Tags: , |

MIDMRKT Local – Event Summary

In the new series MIDMRKT Local, Symantec and MIDMRKT Suite partner to bring together local IT executives for interactive discussions on cybersecurity. Thus far, we’ve met with nearly 100 executives in the following cities: Alexandria, Virginia Salt Lake City, UT Minneapolis, MN Milwaukie, WI Here’s a recap of what we’ve learned thus far! There [...]

2019-10-01T17:03:13-04:00March 18th, 2019|Categories: MIDMRKT Local, Security|Tags: |

Keeping Pace with Network Security and Compliance

In the next five to ten years, we can safely predict that industry and our daily lives will be further affected by game-changing innovations in technology. AI, machine-learning, virtual reality, IOT – all of these have and will continue to change the way we interact with customers, business partners, and even our close friends. [...]

2019-10-01T17:03:22-04:00March 4th, 2019|Categories: Networking, Security|Tags: , , |

Safeguarding against social engineering attacks

Social engineering attacks have been on the rise in the last year, and staying a step ahead of cyber criminals continues to tax the resources of midmarket IT teams. These specialized phishing attacks with a high rate of success continue to catch users off guard. The risks Social engineering attacks, most commonly distributed via email, [...]

2018-05-11T06:21:18-04:00May 11th, 2018|Categories: Blog|Tags: , , |

Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

The Question of Advanced Attack Protection – Reframed

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |