Enabling Robust Security with Intent-based Segmentation

Posted on February 6th, 2019 by Responsible Cyber

Most networks, despite all of their digital connectedness, are not only flat, but are also built around an “Implicit Trust” philosophy. Because of this, once the perimeter has been breached an attacker is able to gain access to the entire network. This allows full freedom of lateral network movement for intruders to find and compromise […]

Read More

Mitigating the Security Risks of Cloud-Native Applications

Posted on February 6th, 2019 by Responsible Cyber

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance. Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the […]

Read More

Creating a Security Culture & Solving the Human Problem

Posted on January 30th, 2019 by Responsible Cyber

People are the biggest weakness to security breaches; people can also be your organization’s biggest defense. Through nearly a dozen years of experience at the FBI and now at Qualtrics, I’ve seen that many of the most successful hackers no longer first look for software vulnerabilities. They’re coming after your people. The reason is simple: […]

Read More

What is a supply chain attack? Why you should be wary of third-party providers

Posted on January 30th, 2019 by Responsible Cyber

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data […]

Read More