As organizations look for help managing their technology, there are a wide and growing number of choices. The Managed Service Provider (MSP) market is booming as are Managed Security Service Providers (MSSP). For consumers, this is good news / bad news. The good news – you have a lot of choices. The bad news – it is very hard to differentiate between all of the choices. The focus of an MSP… Read More
DataEndure’s New White Paper Takes a Closer Look at Zero Trust
Ponemon’s Cost of a Data Breach Report was recently updated for 2021, and notably, 65% of organizations said they do not have Zero Trust implemented. And of those, 43% have no plans to deploy it. Given how convoluted the topic of Zero Trust can be those statistics aren’t particularly surprising. Yet given the security threats we face today and the changing nature of the enterprise, Zero Trust is a critical… Read More
Considering Development? Consider Security.
Originally posted on LinkedIn by DataEndure Cloud and Data Science Practice Manager, Scott Stephenson. More and more organizations are engaging in software development. The reasons for doing so are diverse: providing a service interface for a legacy system, creating operations scripts to automate IT tasks, or even building entire SaaS services, software tools, or products. Organizations that may have never considered software development now find they need to engage in… Read More
A Tale of 2 Micros: Microbrew and Microsegmentation
Below is an excerpt from a recent DataEndure event, “A Tale of 2 Micros: Microbrew and Microsegmentation” If you are scratching your head at the title of our most recent event, we’ll take a moment to clarify. Consider the large and growing attraction to the microbrew beer industry – consumers appreciate the diversity of flavor and other characteristics that are specific to their tastes. The craft succeeds because they are… Read More
Your Data Can and Will be Used Against You
Originally posted by DataEndure CMO, Kirstin Burke, on linkedin.com Highlighting the news today is a second massive LinkedIn breach that reportedly exposes the data of 700M users – over 92% of LinkedIn’s total user community.* Moreover, the hacker has published one million sample dataset on the Dark Web, with records including phone numbers, email and physical addresses, geolocation data, other social media accounts and user names as well as inferred salaries. While no passwords seem… Read More
Are you bringing a knife to a gunfight?
Originally posted by DataEndure CMO, Kirstin Burke, on linkedin.com No matter how you slice it, cybersecurity is a huge issue for organizations, and it’s not getting better any time soon. The cost of cybercrime soared to over $1 trillion in 2020, according to McAfee. As a response, companies may look to increase their cybersecurity budgets. Here’s the rub – many are actually underinvesting in the solutions needed to meet today’s threat… Read More
How to transform GRC to support–not stifle–your business
One of the recurring themes we are hearing from organizations is that in their rush to respond to increased security threats over the past year, GRC (Governance, Risk management, and Compliance) has taken a back seat. In reality, security and compliance are intertwined, so the better organizations can manage their GRC effort, the better their security will be. The pandemic has created a scenario where organizations have had to scramble… Read More
SOAR and your Security Posture: 3 Considerations for evaluating SOAR
As companies evaluate ways to improve their security posture, one area getting a lot attention are solutions that provide a level of automated response to attacks. Security Orchestration, Automation and Response (SOAR) is one such solution. According to Gartner, the three most important capabilities of SOAR technologies are: Threat and vulnerability management: These technologies support the remediation of vulnerabilities. They provide formalized workflow, reporting and collaboration capabilities. Security incident response:… Read More
Now more than ever, cybersecurity is everyone’s business (Part 3 of 3)
Now more than ever, cybersecurity is everyone’s business (Part 3 of 3) In our previous blogs, we have been looking at how DataEndure’s approach to a fully-managed security solution helps put organizations on offense and take the critical time advantage away from cyber-adversaries. Today, we wrap our series with a look at the specific technologies and methodologies that help accelerate threat detection and improve investigation and response times. The DataEndure… Read More
Now more than ever, cybersecurity is everyone’s business (Part 2 of 3)
In our previous blog, we looked at the unprecedented cybersecurity challenges of 2020. In today’s blog, we look at how DataEndure’s approach to a fully-managed security solution helps put organizations on offense and take the critical time advantage away from cyberadversaries. While adversaries have quickly evolved, many tools have not. A fully-managed security solution with a robust and complete security stack can bridge the gap between your organization’s time and… Read More
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- 9
- Next Page »