AuthorDark Reading Staff

Practically Applying Threat Intelligence to Your Business

Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment - and by better understanding the potential impacts of those specific threats.

Enabling Appropriate User Access in a “Zero Trust” World

Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today's perimeter-less enterprise environments - including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.

Stopping Bots and Credential Stuffing: A Smarter Strategy

Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity - and why all bots are not created equal.

Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR

To cope with today's fileless endpoint attacks - especially those that aren't precisely similar to previously known exploits - Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.

Keeping the Business Safe Across Hybrid Cloud Environments

Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.

Optimizing the Security Awareness of Your End-Users

End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that - if you implement the right behavioral diagnostics and focus your training needs on individual users' actual weaknesses.

Leveraging Threat Intelligence across Infosec Roles

Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team - including vulnerability management and threat response staff - can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.

Latest News from RSAC 2018

Companies Still Suffering From Poor Credential Hygiene: New Report

Credentials are being mis-handled and it's hurting most companies, according to a new report out today.

Companies Still Suffering From Poor Credential Hygiene: New Report

Credentials are being mis-handled and it's hurting most companies, according to a new report out today.