article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

And now, early adopters of security data lakes like Snowflake are saving more than two-thirds of what they were paying for their Splunk license. The Cisco acquisition shall exacerbate these challenges and speed up the adoption of security data lakes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough. This has left many CISOs to questions whether or not today’s cybersecurity categories are still relevant. It requires a massive architecture overhaul. CISO need to change the conversation. Categorizing solutions. Active learning.

CISO 140
article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

It also feeds into the larger argument for adopting a zero-trust architecture , a methodology that essentially assumes that no user or devices trying to connect to the network can be trusted until they’re authenticated and verified. There also is the zero-trust architecture, according to the ThreatLabz report.

IoT 145
article thumbnail

Top MDR Services for 2021

eSecurity Planet

Key differentiators: Cloud-native architecture for use with cloud systems. Sophos also provides actionable steps for addressing configuration and architecture vulnerabilities to improve overall security posture. 58% of CISOs report concern that this skills gap will continue to increase. Focus on collaboration.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

Best of all, there is no incremental cost based on the volume of data collected. Cyber Observer’s partnership with Cisco enables CISOs to manage and monitor their cybersecurity eco-system posture. Data includes RF Device location information, RF Device packet information, RF Network connectivity.