
10 Ways To Own Your Cybersecurity In 2020
Bottom Line: One of the best New Year’s resolutions anyone can make is to learn new ways to secure their personal and professional lives online, starting with ten proven ways they can take greater control over their own cybersecurity. For many professionals, their personal and professional lives have blended together thanks to the growing number […]

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model
60% of security and IT professionals state that security is the leading challenge with cloud migrations, despite not being clear about who is responsible for securing cloud environments. 71% understand that controlling privileged access to cloud service administrative accounts is a critical concern, yet only 53% cite secure access to cloud workloads as a key […]

7 Signs It’s Time To Get Focused On Zero Trust
When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing Gold Rush of 2019 The intensity private equity (PE) firms have for acquiring and aggregating manufacturing businesses is creating […]

The Truth About Privileged Access Security On AWS And Other Public Clouds
Bottom Line: Amazon’s Identity and Access Management (IAM) centralizes identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today. AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do […]

Your Mobile Phone Is Your Identity. How Do You Protect It?
The average cost of a data breach has risen 12% over the past 5 years and is now $3.92M. U.S.-based breaches average $8.19M in losses, leading all nations. Not integrating mobile phone platforms and protecting them with a Zero Trust Security framework can add up to $240K to the cost of a breach. Companies that […]

How To Deal With Ransomware In A Zero Trust World
Lake City, Florida’s city government paid ransomware attackers about $530,000 or 42 Bitcoins, to restore access to systems and data last month. The City of Riviera Beach, Florida, paid ransomware attackers about $600,000 to regain access to their systems last month. Earlier this month, LaPorte County, Indiana paid over $130,000 worth of Bitcoins to ransomware […]

Roadmap To Zero Trust For Small Businesses
Bottom Line: Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches. Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and […]

Top 10 Cybersecurity Companies To Watch In 2019
Gartner predicts worldwide spending on information security products and services will reach $124B in 2019, growing 8.7% over the $114B invested in 2018. Cloud Security platform and application sales are projected to grow at a 35.3% Compound Annual Growth Rate (CAGR) between 2017 to 2019, becoming a $459M market this year. Security Services is projected to be […]

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
Bottom Line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up. Separating Security Hacks Fact from Fiction It’s […]