Remove CTO Remove Firewall Remove Reference Remove Security
article thumbnail

Security 2020: Why We See Big Opportunity for Founders Building Developer-Centric Security Startups

Battery Ventures

Cybersecurity remains a huge pain point for many organizations: Last year, a study by incumbent security provider Palo Alto Networks found security teams at large enterprises use more than 130 separate security solutions, on average. How did we get here?

article thumbnail

Machines won’t replace threat hunters until they master this one skill

Lacework

Even those in the world of cybersecurity are wondering where those boundaries lie. That’s in large part because with the world’s growing focus on cybersecurity, we’re seeing increasingly more threat detection tools with advanced capabilities. What do threat hunters do that cybersecurity tools can’t?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Perfect and Continuous Storm: Understanding the Cyber Implications of the Regulatory Governance For Security Advisors

CTOvision

Founder and Chief Security Strategist at eSentire Eldon Sprickerhoff recently penned a blog post titled " The Perfect Storm: Understanding the Implications of the Regulatory Governance Spotlight." This is a field we encourage all technology professionals to track, even if your current duties are far from the investment advice world.

article thumbnail

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative

CTOvision

This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. Over the past 15-20 years the industry has invested billions in pursuit of automated security layers (e.g. FireMon refers to this new class as ‘Unknowns.’. Related articles.

Analytics 107
article thumbnail

Cloud Security Basics: Protecting Your Web Applications

Tenable

While cloud computing providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure offer robust and scalable services, securing your cloud environment brings its own unique challenges. You can reduce risk by addressing these eight common cloud security vulnerabilities and misconfigurations.

article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

Here is a bit more on why: “Bogon” is an informal term used to describe IP packets on the public Internet that claim to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority (IANA) or any of the Regional Internet Registries (RIR).

IPv6 96
article thumbnail

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. What are some IoT devices? Automated devices which remotely or automatically adjust lighting or HVAC.

Internet 142