Showing only posts by Robin Birtstone. Show all posts.

Reducing the cloud security overhead

Source

Why creating a layered defensive strategy that includes security by design can help address cloud challenges Sponsored Feature The world is filled with choices. Whether it's the 20 different types of shampoo on offer at the grocery store, or the dozens of Linux distros you can try for free …

Outsource to infill on cyber security

Source

Automating, simplifying, and calling in external help can increase the chances of blocking and mitigating attacks Sponsored Feature Life is tougher than ever for security pros facing a rising tide of cyberattacks. And adversaries are becoming more adept than ever at using diverse methods and technologies to scale up …

Helping Windows 11 fight the hackers

Source

How Intel is using hardware-assisted security to beef up Microsoft OS protection Sponsored Feature When Windows 11 launched in October 2021, one of its big selling points was a new security architecture. Microsoft designed it from the ground up with zero-trust principles in mind, refusing to trust the legitimacy …

Can IAM help save on cyber insurance?

Source

Demonstrating a robust defense can help underwrite cyber risk for customers and providers, says One Identity Sponsored Feature Underwriters are continuing to feel the pinch as cyber insurance claims mount. That means customers are hurting too, with policies becoming more costly and insurers demanding more proof of cybersecurity. So …

Defending the Endpoint with AI

Source

Traditional endpoint security isn't working, says Darktrace Sponsored feature Remember the good old days, when the only devices a company had to worry about were the PCs on its own network? Today, security teams must yearn for those times as they struggle to protect endpoint devices everywhere.... [...]

Welcome to the Age of Zero Trust

Source

Rules-based systems don't work, says Darktrace Paid Feature What's highly valuable, often sensitive, and possibly dangerous when it trickles out of your business into the wrong hands? That's right – it's your workforce. Companies are struggling to retain employees and hire new ones as workers seek new opportunities elsewhere. That …

Defending the endpoint with AI

Source

Darktrace Enterprise Immune System collates and crunches network traffic patterns Paid feature Remember the good old days, when the only devices a company had to worry about were the PCs on its own network? Today, security teams must yearn for those times as they struggle to protect endpoint devices …

How ransomware gangs went pro

Source

They're developing new techniques 'in every area' says Darktrace Paid Feature Ransomware has come a long way since the early days. When it first started out, it spread indiscriminately and often used poor code. Over the years, it has become more sophisticated and is now an efficient business. How …

What is operations-centric security?

Source

Let’s find out... with Cybereason CEO Lior Div Sponsored The SolarWinds attacks compromised tens of thousands of systems across US federal government agencies and private sector companies alike. The US will feel its effects for years, and it was largely avoidable. In fact, according to Lior Div, CEO …