Fran comments on interesting news and her ideas about IT security.
Regulations are a fact of life for many organisations and the burden of complying with them is getting greater. The new PCI DSS 4.0 will be a reality soon.
2020 was the year that the traditional enterprise perimeter finally became an outdated concept. Identity is the new perimeter.
Autonomous security makes informed decisions according to events that are seen from knowledge and experience gained from previous events.
It has long been said that security requires a three-pronged approach, and this is especially true where incident response is concerned.
Vanishing perimeters are vastly increasing the attack surface for all organisations. Many need a simple, integrated cloud security platform to keep safe.
CyberArk’s new Cloud Entitlements Manager is designed to help organisations rationalise and remediate excessive or unwanted privileges.
Identity management technologies are undergoing considerable transformation to make them fit for purpose for the modern era.
Red teaming exercises help organisations to improve their security posture by using adversarial techniques to pinpoint weaknesses.
The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
Once, managed security services were somewhat limited in nature, managing such tools on behalf of customers. MDR services shift that paradigm.