August 22, 2019
Red/green systems, which give users one system for work and another for other tasks, no longer makes sense from a security and cost perspective. There are alternatives. Read more â¶
Built to scale: 5 tips for structuring your security organization for growth
12 things every computer security pro should know
How much should you spend on security?
Developing personal OPSEC plans: 10 tips for protecting high-value targets
How to check Privileged Identity management settings for Office 365
6 risk factors to know when hiring an MSSP
Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior.Attackers are getting better at moving around inside systems without being detected. Read more â¶
How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more â¶
DEALPOST
This intuitive collaboration platform is made for teams that move. Read more â¶
Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more â¶
Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more â¶
Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more â¶
Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk. Read more â¶
A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more â¶
Attend this webinar to learn how enterprises can improve network operations by adopting a unified network monitoring platform. Read more â¶