What is a Group Policy? It’s the method by which many IT execs update and apply security and configuration settings to groups of machines throughout their network. On the surface, it’s considered a proactive and efficient way to secure and…
SASE was created to address two primary concerns. Organizations using SD-WAN solutions needed better security, and VPNs were becoming increasingly bottlenecked. So, what is SASE? As organizations tried to integrate Cloud Security providers like ZScaler for SWG and Netskope for CASB…
What are the differences between SASE and SSE? A fair comparison between SASE vs SSE comparison starts with what use cases you’re seeking to solve. This will give you a great overview of how Secure Access Server Edge (SASE) and…
What is a decryption key? How is it used? And most importantly, what’s involved when it comes time to decrypt data from ransomware? For the savvy CISO, understanding how decryption keys are used is vital. But it’s even more important…
AI and ML are promising tools in the cyber security war. Using them to prevent an attack is top of mind for CISOs. But the differences between malware and ransomware make one easy to detect with AI, while the other…
Cybersecurity insurance policies have been seen by CISOs as a last-resort safety net, but by 2023 that safety will almost entirely be gone. Historically, losses incurred from downtime are reimbursed if tech executives agree to a set of compliance standards…
Have you ever asked, what is Black Hat? Unlike other technology conferences and the people that attend them, Black Hat is a conference that attracts a unique group of people who sees problems in the world differently than most of…
Political affiliation aside, 2,000 Mules has raised more than its share of eyebrows. One element of the film relies on precise geolocation data generated from cellphones. Fact-checkers were quick to claim it wasn’t possible for filmmakers to collect GPS location data…
With Russia ratcheting up its cyberattacks against companies in the USA, DHS/CISA has asked enterprise organizations to check and update their firmware. To get ahead of potential challenges, savvy IT leaders are asking when this kind of attack became mainstream,…
The endless cyber debate between prevention and detection may be settled thanks to former NSA Data Scientists. A new method, not yet on the market (but being fast tracked due to new Russian threats), enables security professionals to visualize their…