Your organization has invested in dozens of cybersecurity tools. But you’re not sure if they’re working as expected. For example, what percentage of successfully blocked attacks reported by your security information and event management (SIEM) tool are false reports, where the attack actually occurred but was reported as blocked? Zero…
Read More
Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted on the condition that, at a minimum, users enter a username and password? True enough. But the term “conditional access”…
Read More
Allow me to shed some light on one of the critical organizational aspects of identity and access management (IAM) that we come across often when delivering IAM consulting services to our customers: Organizations that fail to address the quality of content for IAM processes may struggle to gain the acceptance…
Read More
If chief information security officers (CISOs) could wave a magic wand and make one cybersecurity issue vanish, malware would top the list. From massive growth in destructive malware attacks to steadily rising data breach costs, malware remains a top priority for organizations. If this threat pulled a disappearing act, CISOs…
Read More