article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

And because network security teams lack direct control, coordinating people, policies and infrastructure scattered across the organization has become impossible to get done in a timely manner. This is more so true as organizations accelerate cloud migration and dive deeper into an interconnected digital ecosystem.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

Top episodes aired in 2023: “EP103 Security Incident Response and Public Cloud — Exploring with Mandiant” (2023 season opener!) More fun guests, Googlers and not Fun Q1 2024 episodes include cloud detection and response (CDR), cloud forensics, some geopolitics (yes, really, we promise it will be cloudy!) More video!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Invest in Security Now for Tomorrow's Challenges

CSO Magazine

Network security is forever a work in progress, but rapid changes in technology and fundamental changes to the nature of work over the past two years leave many organizations wondering if they can ever catch up. Unmanaged endpoints are a new reality that are challenging conventional approaches to network perimeter security.

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

The threat landscape is constantly evolving, ransomware is more persistent than ever before, and HEAT attacks have rendered traditional security solutions ineffective.”. Menlo Security is backed by Vista Equity Partners, Neuberger Berman, General Catalyst, American Express Ventures, Ericsson Ventures, HSBC, and JP Morgan Chase.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

During the first two decades of this century, virtual private networks —VPNs—served as a cornerstone of network security. VPNs encrypt data streams and protect endpoints from unauthorized access, essentially by requiring all network communications to flow over a secured pipe. Related: Deploying human sensors.

VPN 213
article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Network security has been radically altered, two-plus years into the global pandemic. MSSPs have since broadened and advanced their services, a trend that continues as cloud migration gained momentum in the 2010s — and then accelerated with the onset of Covid 19.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Security Boulevard

Top episodes aired in 2023: “EP103 Security Incident Response and Public Cloud — Exploring with Mandiant” (2023 season opener!) More fun guests, Googlers and not Fun Q1 2024 episodes include cloud detection and response (CDR), cloud forensics, some geopolitics (yes, really, we promise it will be cloudy!) More video!