article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He has 15 years of cybersecurity technical product and program management experience delivering cyber solutions and developing thought leadership across multiple verticals, with a focus on threat detection, threat exposure management, response/remediation and protection. He was also director of the SANS Internet Storm Center.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The Global State of Information Security Survey 2017 suggests that companies should look into deploying threat detection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.