Review: FireMon clears the clutter for network security policy management

Posted on May 31st, 2019 by Responsible Cyber

It’s kind of a paradox that as an organization’s network grows, they have to add more and more security appliances and programs to keep it safe, yet with increased complexity comes diminishing returns on those investments. What happens is that new security platforms implement new rules, which often conflict with or duplicate existing protections. And […]

Read More

Act fast to recover assets after cyber fraud

Posted on May 31st, 2019 by Responsible Cyber

Targeted scams that cause organizations to redirect payments is resulting in billions of dollars in losses each year, and often recovery of those lost assets is very difficult. In April 2019, for example, a church in Ohio was scammed out of $1.75 million after it came to light that it had been paying construction fees […]

Read More

How to conduct a proper GDPR audit: 4 key steps

Posted on May 22nd, 2019 by Responsible Cyber

For many organizations, preparing for the European Union’s (EU) General Data Protection Regulation (GDPR) has been a time-consuming endeavor. Unfortunately, the work is not over. Now that GDPR is in effect, companies will need to do regular internal audits to assess their compliance levels. The ability to document these audits will be vital in the […]

Read More

True Cybersecurity Means a Proactive Response

Posted on April 6th, 2019 by Responsible Cyber

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security. Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems are constantly advancing. As they gain knowledge, they develop and implement sophisticated impersonation methods that are proving increasingly adept at evading detection and gaining access to […]

Read More

Focus on Business Priorities Exposing Companies to Avoidable Cyber-Risk

Posted on April 6th, 2019 by Responsible Cyber

Despite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to avoidable cyber-risk because of a persisting tendency to put business interests ahead of safety, a new study by Tanium shows. The security vendor surveyed some 500 […]

Read More

SaaS Ecosystem Complexity Ratcheting Up Risk of Insider Threats

Posted on March 24th, 2019 by Responsible Cyber

Even with common security platforms like CASBs, organizations struggle to deal with the volume of apps and accounts that interact with business-critical data. The pressure of increasing software-as-a-service (SaaS) deployments in the enterprise and the complexity of administering accounts across a varied cloud environment is ratcheting up the risk of insider threats. A new study […]

Read More

It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job

Posted on March 14th, 2019 by Responsible Cyber

Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find. As the demand for cybersecurity professionals continues to rise against the backdrop of a job candidate shortage, employers say only half of applicants (or fewer) actually meet the qualifications. The new data from […]

Read More

Review: Bitglass manages the mobility monster

Posted on March 14th, 2019 by Responsible Cyber

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves of suited workers sitting at their desks from nine to five every day, typing away with desktop computers or even older technology simply doesn’t hold up in today’s always on, always connected world. Modern workers […]

Read More

Bolstering Endpoint Security

Posted on March 14th, 2019 by Responsible Cyber

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded as the number […]

Read More

There May Be a Ceiling on Vulnerability Remediation

Posted on March 14th, 2019 by Responsible Cyber

Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows. Security has no shortage of metrics — everything from the number of vulnerabilities and attacks to the number of bytes per second in a denial-of-service attack. Now a new report focuses on how long it takes organizations […]

Read More