Cybersecurity Industry News Roundup, Week of February 1, 2016

FireEye remains aggressive, Norse implodes, and cybersecurity Symantec top the week’s events


The Endpoint Security Continuum

Next-generation endpoint security action is divided into two camps: Advanced prevention and in-depth detection and response. In between these poles lie an assortment of additional security controls.


Security Requirements Are Driving Identity Management

Cybersecurity professionals are getting more involved in identity and access management (IAM) decisions and day-to-day operations driving changes to IT and infosec.


Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion.


The 4 kinds of cybersecurity customers

The 4 kinds of cybersecurity customers

Four different customer profiles to consider when selling cybersecurity products and services


Network Security Sandboxes Driving Next-Generation Endpoint Security

Anti-malware gateways are driving next-generation endpoint security implementation and antivirus replacements at large organizations.


The Incident Response “Fab Five”

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation.


Cybersecurity Industry Predictions for 2016

Skills shortage, M&A, and trusted systems will impact the industry this year


Creating a Cybersecurity Center of Excellence

To attract the best talent, enterprise organizations need to establish a culture of cybersecurity, invest in people, and give the cybersecurity team the latitude and tools it needs to succeed.


A Few Cybersecurity Predictions for 2016

Cyber supply chain security, identity consumerization, cyber insurance, and ransomware will be top of mind next year.


When APIs and DevOps Meet Cybersecurity

Center of gravity will flow to middleware and cybersecurity process expertise as software integration proliferates in the enterprise cybersecurity market.


Software Security is Not Keeping Up

Home-grown software remains vulnerable, and organizations aren't doing enough to protect it.


Enterprises Need to Improve IT Vendor Risk Management

Time to demand strong security from ALL IT vendors before purchasing products and service.


Handicapping Enterprise Security Vendors

Handicapping Enterprise Security Vendors

Huge opportunity for enterprise security leaders to become multi-billion dollar businesses over the next few years


Cybersecurity Lessons Learned from the 9/11 Commission Report

Organizations must move beyond misaligned goals, poor collaboration, and organizational intransigence that hamper cybersecurity efforts at enterprise organizations.


The State of Cyber Insurance

Immature market, land grab for customers, high premiums, little change in the short-term.


Cloud Computing And Network Security Challenges

ESG research points to problems with automation, visibility, skills, and staffing.


Cisco Acquires Lancope: Great Fit, Great Deal

Security analytics firm fits hand-in-glove with Cisco products, services, and cybersecurity strategy


IT Vendor Risk Management: Improving but Still Inadequate

Despite advances over the past five years, IT vendor risk management is still done haphazardly and relies on static paper-based audits.


The Return of AV Leaders?

Intel Security, Sophos, Symantec, Trend Micro, and Webroot have extended endpoint security products for advanced malware prevention, detection, and response.


Load More