article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

Attacks are becoming more bespoke, government-sponsored threat actors and ransomware as a service, continue to unravel challenging businesses to minimize the time from initial breach to complete compromise, in the event of a compromise. . Digital transformation and Zero Trust . Insider attack attempts are not slowing down.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In this fast-evolving, digitally-transformed, business environment, enterprises in 2018 will spend a record $3.8 Two thirds of the large enterprises recently surveyed by 451 Research and Digital Guardian reported maintaining as many as five endpoint security services, and one in 10 respondents dealt with as many as 10 solutions.

Antivirus 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Different industries and regions have specific regulatory requirements, such as the General Data Protection Regulation (GDPR) for data protection in the EU, the Health Insurance Portability and Accountability Act (HIPAA) for healthcare information in the US, and the Payment Card Industry Data Security Standard (PCI-DSS) for credit card information.

article thumbnail

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

The Last Watchdog

Juniper gathers threat feeds via a security framework, called SecIntl , that runs off servers tied together by Juniper equipment deployed globally in corporate networks. Schuermann At Black Hat 2019, the company announced its latest initiatives to block threats at the router level. I’ll keep watch. Talk more soon.

article thumbnail

The Growing Importance of Cybersecurity in California’s Healthcare Industry

Cytelligence

The healthcare industry has witnessed a rapid digital transformation, with hospitals, clinics, and medical practices relying heavily on technology to store and manage patient data, streamline operations, and improve patient care.

article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. About the essayist: Chris Gerritz is the co-founder and CPO of Infocyte , a pioneer in forensics-based proactive cyber threat detection and instant incident response. .

article thumbnail

Phishing-resistant MFA 101: What you need to know

CyberSecurity Insiders

The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. Account takeover Achieving Account Takeover (ATO) means successfully compromising a target account with the intent of committing fraud.

Phishing 109