article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

And because network security teams lack direct control, coordinating people, policies and infrastructure scattered across the organization has become impossible to get done in a timely manner. This is more so true as organizations accelerate cloud migration and dive deeper into an interconnected digital ecosystem.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

During the first two decades of this century, virtual private networks —VPNs—served as a cornerstone of network security. VPNs encrypt data streams and protect endpoints from unauthorized access, essentially by requiring all network communications to flow over a secured pipe. Related: Deploying human sensors.

VPN 213
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Network security has been radically altered, two-plus years into the global pandemic. MSSPs have since broadened and advanced their services, a trend that continues as cloud migration gained momentum in the 2010s — and then accelerated with the onset of Covid 19. A drill-down on MSSPs is coming tomorrow (Sept.

article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

Andrew Bayers, head of threat intelligence at Resilience, told eSecurity Planet that the potential impact of attacks like these shouldn’t be underestimated, particularly for organizations that rely on Internet connectivity for key operations.

DDOS 107
article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever. As companies adjusted in the post pandemic operating environment, Internet-centric services rose to the fore. What’s to happen next?

CISO 244
article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

LW: To what extent is Cisco’s acquisition of Splunk just a microcosm of a wider shift of network security that’s taking place? Can you frame how legacy security tools (NGFW, WAF, web gateways, SIEM, SOAR, UEBA, XDR, VM, IAM, etc.) LW: What do you expect network security to look like five years from now?

Marketing 306
article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

What’s more, the rapid rise of a remote workforce, in the wake of Covid 19, has only served to accelerate cloud migration, as well as scale up the attendant network exposures. Enterprises can head down several viable paths to start doing this, with respect to network security. See, assess, mitigate.