Strengthening the Cybersecurity of Active Directory to Mitigate Cyber-Risk
"Organizations must be able to manage their identity security in hybrid environments that use both on-premises Active Directory and Azure Active Directory services on...
A Data Breach Today, a Ransomware Attack Tomorrow
“Organizations should not think twice about implementing advanced security features like multi-factor authentication (MFA). The key to finding a good balance between usability and...
The State of Cybersecurity in 2022 – Addressing the Skills Shortage
“Businesses should prioritize retaining their cybersecurity talent, and investing in their security operations. Those that prepare and invest now, will be in a much...
Minimizing the Blast Radius of Credential Theft
Deployment of concealment techniques to sensitive files, folders, credentials, and other assets, will also limit an attack’s severity because attackers cannot exploit or steal...
Stopping Data Leaks in the Automotive Sector
“Today’s complex digital landscape requires a defense-in-depth approach. Automotive manufacturers should be deploying multiple layers of security,” says Pauline Losson, Global Director of Analysts...
CIOs Need To Identify the Security Gaps in Hybrid Cloud Environment
“As IT teams are looking for solutions to cope with the data deluge (a product of 5G rollouts around the world), automation is likely...
Embracing Cloud-Native Security in the Digital Era
“As with many technologies, with increased usage comes increased risk of sophisticated attacks, particularly those aimed at the supply chain. This is just one area we’re of where we’re seeing an increase...
Deep Learning and how it is Transforming the Cybersecurity Landscape
“Currently, I see a race between using artificial intelligence to engineer and reverse engineer detection and prevention capabilities. Because the solution of deep learning...
The Nuances of Security in a Digital Infrastructure
In an exclusive interview with ITSecurityWire, Bill Franklin, Senior Director of Cloud Engineering at AVANT says “Measuring a company’s risk, business flow and driving...
Incorporating Zero-Trust Model Approach can Strengthen Endpoint Security
“With sophisticated cyber-attacks becoming increasingly commonplace, it’s clear that organizations need to integrate holistic cybersecurity solutions and management tools into their technologies stacks to...