The CIP Report

MELANIE GUTMANN | April 26, 2016

article image
Government and corporate computer systems are attacked, networks are penetrated by hackers, and enterprises are protected by demilitarized zones.1 Language that until recently was used to describe security and warfare in military settings has now become commonplace in cybersecurity discussions.

Spotlight

Arctic Wolf Networks

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. To effectively combat cyber threats, AWN CyberSOC™ relies on a one-two punch of human expertise and machine intelligence.

OTHER ARTICLES

The Coronavirus is Already Taking Effect on Cyber Security– This is How CISOs Should Prepare

Article | March 18, 2020

Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. The Coronavirus is hitting hard on the world’s economy, creating a high volume of uncertainty within organizations. Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution (learn more here) to protect employees that are working from home with their personal computers, because of the coronavirus. Cynet identifies two main trends – attacks that aim to steal remote user credentials, and weaponized email attacks:

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

CYBERSECURITY AND CORONAVIRUS: KEEPING YOUR BUSINESS SAFE

Article | March 19, 2020

Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybersecurity expert, outlines key challenges and tips for staying secure while away from the office. As governments and businesses work on mitigating the impact of the ongoing COVID-19 outbreak, social distancing measures are leading to an increase in remote working across all sectors. The reasoning behind the measures is best left to health authorities, and are discussed at length elsewhere. The purpose of this article is to shed light on some of the key cybersecurity challenges around the sudden spike in remote work arrangements, and propose potential measures to keep networks as secure as possible during these times.

Read More

Spotlight

Arctic Wolf Networks

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. To effectively combat cyber threats, AWN CyberSOC™ relies on a one-two punch of human expertise and machine intelligence.

Events