article thumbnail

Cisco to offer Webex air-gapped cloud system for security, defense work

CSO Magazine

Building on its WebEx product line, Cisco plans to deliver an air-gapped, cloud-based collaboration system for companies involved in US national security and defense work, extending the secure offerings the company already provides to industries that require collaboration tools with strong security measures to meet US government requirements.

article thumbnail

How to choose the best SIEM software

CSO Magazine

To protect your enterprise against security threats, you need maximum visibility. That’s the fundamental notion behind SIEM (security information and event management) software, which is essential to the security defenses of most large and many medium enterprises.

Software 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Awareness: How to Cultivate the Human Side of Security

CyberSecurity Insiders

By Amanda Fennell, CSO and CIO, Relativity. Sophisticated security tools and well-constructed processes can help insulate an organization from the relentless cyberattacks that are part of the digital reality businesses face every day and everywhere. People are the linchpin in any organization’s security posture—and the wildcard.

CSO 131
article thumbnail

BrandPost: Protecting Children from Online Cybersecurity Risks

CSO Magazine

Cybercriminals have honed in on the influx of new devices connected to the home network as an opportunity to execute ransomware attacks, steal information, or compromise public school district’s security defenses.

Risk 114
article thumbnail

BrandPost: A New Model for Defeating Cyberattacks and Reducing Costs

CSO Magazine

Many enterprises are spending billions of dollars every year on network and endpoint security defenses — often to no avail, as data breaches persist and accelerate. The study also points out that the leading cause of these costly and potentially damaging events is malicious or criminal activity.

article thumbnail

VulnRecap 1/29/24 – Apple, Apache & VMware Under Attack

eSecurity Planet

“The most significant risk for enterprises isn’t the speed at which they are applying critical patches; it comes from not applying the patches on every asset,” noted Brian Contos, CSO of Sevco Security. The simple fact is that most organizations fail to maintain an up-to-date and accurate IT asset inventory.”

Software 115
article thumbnail

SOC modernization: 8 key considerations

CSO Magazine

We are at a point where the scale and complexity of historical security defenses either aren’t working or are stretched to their limits. This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play.

CISO 86