article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

Based in Morrisville, NC, JupiterOne launched in 2020 and last week announced that it has achieved a $1 billion valuation, with a $70 million Series C funding round. Remediating security gaps in modern networks, not surprisingly, can quickly devolve into a tangled mess. Here are my takeaways: Imposing context.

article thumbnail

Untangle SD-WAN Router 3.0 Network Security for Your Workforce

Security Boulevard

In fact, according to the Verizon Business 2020 Data Breach Investigations Report (2020 DBIR), almost a third of data breaches (28%) in 2020 involved small businesses. Technology may be rapidly advancing to increase protection, yet cybersecurity adversaries continue […]. The post Untangle SD-WAN Router 3.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

With almost every aspect of business becoming more digital, enterprise network security software minimizes the impact of cyberattacks — especially as guarding against them protects a company’s operations and safeguards its competitiveness in a fast-moving marketplace. Top network security tools. XM Cyber Platform.

article thumbnail

Network Security in the Cloud

Trend Micro

The events of 2020 have confirmed what most technology leaders across the country already know: cloud computing is the key to driving business agility and unlocking value.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever. Yokohama observed that once clearly defined network boundaries have all but disappeared, making network security a very difficult challenge.

CISO 244
article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. By 2025, we expect 21.5

IoT 145
article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. Nikulin is currently serving a seven-year sentence in the U.S. prison system.