AuthorDark Reading Staff
Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment - and by better understanding the potential impacts of those specific threats.
Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today's perimeter-less enterprise environments - including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.
Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity - and why all bots are not created equal.
To cope with today's fileless endpoint attacks - especially those that aren't precisely similar to previously known exploits - Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.
Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.
End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that - if you implement the right behavioral diagnostics and focus your training needs on individual users' actual weaknesses.
Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team - including vulnerability management and threat response staff - can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.