We have evaluated quite a few cloud security platforms designed to bring the same high level of cybersecurity protections found on physical assets to the more nebulous and constantly-evolving cloud environment. Although they have used various technologies and techniques, the majority of them strive to provide application-level security, ensuring that no vulnerabilities creep into deployed
Aggregating Disparate Datasets, Real-Time Visibility And Emerging Tech Lead Challenges Security professionals face several challenges today when it comes to enterprise cyber security asset management from aggregating disparate data sets or establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, only complicate this situation further. In this Cyber Security Digital Summit
Moore has built a network asset discovery tool that wasn’t intended to be a pure security tool, but it addresses a glaring security problem. HD Moore, famed developer of the wildly popular Metasploit penetration testing tool, is about to go commercial with a new project he originally envisioned would give him a nice break from
It may seem obvious, but many companies lose sight of the fact that they can’t protect what they don’t know they even have. There is one simple truth of effective cybersecurity: You can’t protect what you don’t see. Comprehensive visibility is the foundation of good security — and it is becoming increasingly difficult to achieve.
Deception as a defensive technology has come a long way in a very short period of time. Today, almost every enterprise network is going to have some form of deception employed to trick and trap unauthorized users. But its success is also becoming a problem because attackers are starting to expect, and in some cases