Remove Cloud Migration Remove Network Security Remove Technology
article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

Remediating security gaps in modern networks, not surprisingly, can quickly devolve into a tangled mess. Both the technology and the teams responsible for specific cyber assets tend to operate in silos. This is more so true as organizations accelerate cloud migration and dive deeper into an interconnected digital ecosystem.

article thumbnail

GUEST ESSAY: Five steps to improving identity management — and reinforcing network security

The Last Watchdog

Remote work (think video conferencing and cloud migrations) has only exacerbated the number of systems employees frequent. In the vein of automation, artificial intelligence (AI) has been heavily hyped up in the technology world, but it may be too early to see the benefits in identity management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever. Yokohama observed that once clearly defined network boundaries have all but disappeared, making network security a very difficult challenge.

CISO 244
article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Nayyar: Many security vendors want a piece of the SIEM market, even if their technology isn’t necessarily purpose-built. Gurucul pioneered UEBA technology a decade ago – in fact our company was built around this capability. LW: What do you expect network security to look like five years from now?

Marketing 306
article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Network security has been radically altered, two-plus years into the global pandemic. Managed security service providers are rising to meet a need that’s clearly out there,” observes Elizabeth Jimenez, executive director of market development at NeoSystems, an MSP and systems integrator. “We

article thumbnail

BrandPost: Invest in Security Now for Tomorrow's Challenges

CSO Magazine

Network security is forever a work in progress, but rapid changes in technology and fundamental changes to the nature of work over the past two years leave many organizations wondering if they can ever catch up. Unmanaged endpoints are a new reality that are challenging conventional approaches to network perimeter security.

article thumbnail

It is Microsoft vs Dell and IBM after SolarWinds hack

CyberSecurity Insiders

Now, debate between tech companies has started on whether it is safe to store data on cloud storage platforms or on-premises appliances. Tech giant Microsoft led by Satya Nadella argues that cloud computing systems are safe any type of corporate data and is encouraging the technology as its future vision.

Hacking 97