article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

And because network security teams lack direct control, coordinating people, policies and infrastructure scattered across the organization has become impossible to get done in a timely manner. This is more so true as organizations accelerate cloud migration and dive deeper into an interconnected digital ecosystem.

article thumbnail

GUEST ESSAY: Five steps to improving identity management — and reinforcing network security

The Last Watchdog

Remote work (think video conferencing and cloud migrations) has only exacerbated the number of systems employees frequent. •Reduce unnecessary applications and systems. Using 10 or more business applications weekly is the norm for approximately a quarter of survey respondents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

During the first two decades of this century, virtual private networks —VPNs—served as a cornerstone of network security. VPNs encrypt data streams and protect endpoints from unauthorized access, essentially by requiring all network communications to flow over a secured pipe. Related: Deploying human sensors.

VPN 213
article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Network security has been radically altered, two-plus years into the global pandemic. MSSPs have since broadened and advanced their services, a trend that continues as cloud migration gained momentum in the 2010s — and then accelerated with the onset of Covid 19.

article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

LW: To what extent is Cisco’s acquisition of Splunk just a microcosm of a wider shift of network security that’s taking place? Can you frame how legacy security tools (NGFW, WAF, web gateways, SIEM, SOAR, UEBA, XDR, VM, IAM, etc.) LW: What do you expect network security to look like five years from now?

Marketing 306
article thumbnail

BrandPost: Invest in Security Now for Tomorrow's Challenges

CSO Magazine

Network security is forever a work in progress, but rapid changes in technology and fundamental changes to the nature of work over the past two years leave many organizations wondering if they can ever catch up. Unmanaged endpoints are a new reality that are challenging conventional approaches to network perimeter security.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever. Yokohama observed that once clearly defined network boundaries have all but disappeared, making network security a very difficult challenge.

CISO 244