Microsoft plans to roll out new managed services that give organizations the expertise needed to proactively hunt for threats and extend XDR beyond the endpoint. Microsoft Security Experts features new managed services as well as existing services around incident response and modernization.
A surprising improvement in loss ratios for cyber insurance providers in 2021 means the rapid rise in premiums might at last subside later this year. The loss ratio declined for the first time since 2018 despite the frequency and severity of claims filed for cyberattacks increasing again in 2021.
As market forces converge to make enterprises of all sizes more conscious of their own cybersecurity sophistication, John Randall of GoSecure proposes a road map to help assess where one is, where one needs to go - and to what degree third-party assistance is necessary.
Organizations of all types and sizes are under attack. Unfortunately, there seems to be a disconnect between defenders’
perceptions and practices of how best to protect themselves and the current cyberthreat landscape -or more precisely the
most common attack vectors leveraged by penetration testers acting as...
Recent headlines such as the attack on SolarWinds and the Log4j vulnerability are motivating organizations to do more when it comes to security. The lack of resources, tools, expertise, and support has driven organizations to invest in managed detection and response (MDR) as a core technology for their security...
As the saga of the 2020 SolarWinds supply chain hack unfolded, many were surprised to learn that the offending
malware had been deployed more than a year before it was discovered. Dwell time was and continues to be a
central issue in IT security. For this reason, many choose a managed detection and response (MDR)...
What security functions should be kept in house, and which ones should be outsourced? The sands are shifting: the days of a fully in-house security operations center are probably gone now, says Elrich Engel, CISO and director of data and architecture at AMP, an Australian financial services company.
The growing use of cloud-based applications (e.g., Microsoft 365, Salesforce.com) by financial institutions has made on-premise remote access solutions suboptimal in terms of traffic flows. The need to backhaul internet-destined to the data center first adds latency and impacts the remote access user experience....
The critical importance of cybersecurity has come to the forefront in 2021 for customers of managed service providers, or MSPs.
Online security has become a “must-have” that MSPs’ customers are willing to pay for - especially when it drives operational efficiencies that can provide longe- term cost savings by...
The effort and cost involved in staying safe in this environment is driving many organizations to work with IT and managed security service providers (MSSPs).
A suspected Russian group blamed for the SolarWinds compromise in 2020 is continuing to innovate and is infiltrating technology services and resellers, according to a new report from Mandiant. Mandiant says the group, which it calls UNC2452 and Microsoft calls Nobelium, practices "top-notch operational security."
Managing the balance between business innovation and operational needs, with enhanced cybersecurity risk management is creating a global ‘talent crunch.’ The scarcity of highly skilled cybersecurity resources, along with organizations looking to leverage Zero Trust, implement least privilege and just-in-time...
Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
Managed service providers are hardly immune from digital transformation. But what does transformation mean through their lens? Adrien Gendre of Vade shares insight on the trends, as well as the business benefits of tool consolidation.
In this eBook Gendre discusses:
MSP transformation trends;
Business benefits of...
Consistent breaches, demand for IS consulting, and a limited supply of qualified specialists all support the idea of outsourcing the key IS officer position as a viable option. This guide outlines questions to ask when researching a vCISO solution. Plus, get an insider’s list of questions for potential...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.