Cybersecurity Industry News Roundup, Week of February 1, 2016

FireEye remains aggressive, Norse implodes, and cybersecurity Symantec top the week’s events

02/04/16

The Endpoint Security Continuum

Next-generation endpoint security action is divided into two camps: Advanced prevention and in-depth detection and response. In between these poles lie an assortment of additional security controls.

02/01/16

Security Requirements Are Driving Identity Management

Cybersecurity professionals are getting more involved in identity and access management (IAM) decisions and day-to-day operations driving changes to IT and infosec.

01/28/16

Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion.

01/25/16

The 4 kinds of cybersecurity customers

The 4 kinds of cybersecurity customers

Four different customer profiles to consider when selling cybersecurity products and services

01/19/16

Network Security Sandboxes Driving Next-Generation Endpoint Security

Anti-malware gateways are driving next-generation endpoint security implementation and antivirus replacements at large organizations.

01/15/16

The Incident Response “Fab Five”

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation.

01/11/16

Cybersecurity Industry Predictions for 2016

Skills shortage, M&A, and trusted systems will impact the industry this year

01/05/16

Creating a Cybersecurity Center of Excellence

To attract the best talent, enterprise organizations need to establish a culture of cybersecurity, invest in people, and give the cybersecurity team the latitude and tools it needs to succeed.

12/17/15

A Few Cybersecurity Predictions for 2016

Cyber supply chain security, identity consumerization, cyber insurance, and ransomware will be top of mind next year.

12/15/15

When APIs and DevOps Meet Cybersecurity

Center of gravity will flow to middleware and cybersecurity process expertise as software integration proliferates in the enterprise cybersecurity market.

12/10/15

Software Security is Not Keeping Up

Home-grown software remains vulnerable, and organizations aren't doing enough to protect it.

12/08/15

Enterprises Need to Improve IT Vendor Risk Management

Time to demand strong security from ALL IT vendors before purchasing products and service.

12/03/15

Handicapping Enterprise Security Vendors

Handicapping Enterprise Security Vendors

Huge opportunity for enterprise security leaders to become multi-billion dollar businesses over the next few years

11/24/15

Cybersecurity Lessons Learned from the 9/11 Commission Report

Organizations must move beyond misaligned goals, poor collaboration, and organizational intransigence that hamper cybersecurity efforts at enterprise organizations.

11/19/15

The State of Cyber Insurance

Immature market, land grab for customers, high premiums, little change in the short-term.

11/16/15

Cloud Computing And Network Security Challenges

ESG research points to problems with automation, visibility, skills, and staffing.

11/10/15

Cisco Acquires Lancope: Great Fit, Great Deal

Security analytics firm fits hand-in-glove with Cisco products, services, and cybersecurity strategy

11/06/15

IT Vendor Risk Management: Improving but Still Inadequate

Despite advances over the past five years, IT vendor risk management is still done haphazardly and relies on static paper-based audits.

11/05/15

The Return of AV Leaders?

Intel Security, Sophos, Symantec, Trend Micro, and Webroot have extended endpoint security products for advanced malware prevention, detection, and response.

11/02/15

Load More