Zero Trust Beyond VPN Replacement: Earning the Most Value for Your Investment

Zero Trust Beyond VPN Replacement

Identity services provider Okta recently conducted a survey that revealed 40% of sampled organizations “are currently deploying projects aligned with a modern, Zero Trust approach to security.” Many of these projects are designed to replace legacy virtual private network (VPN) systems, which have been the go-to choice for secure remote access. However, there’s more to […]

Understanding the Difference Between an MSSP and MDR

Understanding the Differences Between an MSSP and MDR

There is a disturbing trend in cybersecurity: As the frequency and sophistication of cyberattacks is increasing, so is the gap between the number of cybersecurity jobs available and the number of applicants with the skills and capability to fill them. As the rule of supply and demand plays out, acquiring and retaining enough in-house expertise […]

How Multi-Cloud Environments Expand Your Attack Surface and How to Manage and Reduce the Risk

Multi-Cloud Environments Expand Your Attack Surface

In a highly connected world, businesses of all sizes are picking up the pace on adopting multi-cloud environments from cloud-based services to infrastructure. The benefits are indisputable: A richer and more versatile set of cloud options, enhanced redundancy, and a superior security/cost value from multi-cloud environments. But using hybrid cloud environments expands the attack surface […]

Assessing Whether You Need Virtual CISO (vCISO) Services, and What to Expect

Virtual CISO (vCISO)

CISO responsibilities can have an impact on processes and operations throughout an organization, from the devices and apps used by employees, to which websites they’re allowed to visit using company resources, to how they access, store and share work documents. Finding a suitable CISO to add to the C-level suite is an important operation for […]

The Cybersecurity Talent Shortage: Myth or Truth?

Cybersecurity Talent Shortage Myth or Fact

Whether or not the cybersecurity industry is currently facing a skills shortage is a matter of intense debate. On the one hand, the (ISC)2 publishes an annual report on the state of the cybersecurity industry, and their current estimate is that more than 4 million cybersecurity positions are currently unfilled globally. On the other, many […]

SOC Audit Report Basics: The What, Why, Who and How

SOC Audit Report Basics

Companies have learned the hard way that vendor and partner data should be considered when hardening their security program. If your organization provides outsourced services to another company, you may be asked to undergo a SOC audit and provide a report as an important part of a company’s third-party risk management program Learn about the […]

5 Considerations for Writing New Remote Workforce Policies and Procedures

Writing Policy and Procedures for New Remote Workforce

Rapid response to potential threats and security incidents is essential to minimizing their cost and impact. Cybersecurity policies and procedures help to speed incident response by ensuring that all parties involved know their responsibilities and how to carry them out. As businesses now consider adjusting their permanent workplace model to accommodate telecommuting, writing new remote […]