Tag: strategy
-
6 critical mistakes that undermine cyber resilience (and how to fix them)
Tags: attack, automation, backup, best-practice, business, compliance, cyber, cybersecurity, data, detection, edr, endpoint, guide, identity, intelligence, malware, metric, network, ransomware, resilience, risk, soc, strategy, threat, tool, update, vulnerabilityGuide to Managing Strong Personalities During a Cybercrisis. Mistake 2: Fragmented asset and risk views: Fragmented asset and risk views make it difficult for teams to understand what is actually in their environment and where the most pressing exposures reside. When devices, configurations, and identity data live in separate tools or are maintained inconsistently, gaps…
-
Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative
The next wave of web development: In an interview with Computerworld, Cloudflare senior product manager Matt Taylor said his team sees the project as the next wave of web development platforms.”There is a whole new generation of developers, and WordPress is old news to them. If you are starting today, there is no way you…
-
OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance
Learn how to protect OT systems, ICS, and SCADA infrastructure from ransomware with backup strategies built for legacy, air-gapped industrial environments. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ot-cyber-resilience-strategic-data-protection-for-iec-62443-and-nis2-compliance/
-
WhatsApp malware campaign uses malicious VBS files to gain persistent access
MSI as the backdoor vehicle for persistence: The final stages of the campaign lead to persistence, using Microsoft Installer (MSI) packages as the delivery mechanism for backdoors.MSI files are an effective choice as they are not usually treated as inherently suspicious and can execute custom actions during installation. In this campaign, they are used to…
-
Why be optimistic about the future of Agentic AI?
How Do Non-Human Identities Revolutionize Cloud Security? Have you ever wondered about the hidden complexities lurking behind cloud security? Organizations are increasingly reliant on cloud-based solutions, and one of the most innovative strategies to bolster security is through effective management of Non-Human Identities (NHIs). These NHIs are crucial players in cybersecurity, particularly when dealing with……
-
What makes Agentic AI a powerful ally in cybersecurity?
How Do Non-Human Identities Elevate Cybersecurity Strategies? Evolving cybersecurity demands innovative approaches to safeguard digital assets, and Non-Human Identities (NHIs) are at the forefront of this transformation. But what exactly are NHIs, and how do they fit into the broader context of cybersecurity, particularly in cloud environments? NHIs represent machine identities used within cybersecurity frameworks….…
-
Beyond the Spectacle RSAC 2026 and The 5 Layers of AI Security FireTail Blog
Tags: ai, attack, business, conference, control, cybersecurity, data, detection, edr, framework, LLM, strategy, technology, tool, vulnerability, vulnerability-managementMar 31, 2026 – Jeremy Snyder – If you were at RSA Conference last year, you probably remember the goats. Or the puppies. Or the miniature petting zoos. It was a year of “over-the-top” spectacle. A bit of a circus, if I’m being honest.Coming into RSAC 2026, the vibe shifted. The show floor was noticeably…
-
Rethinking Vulnerability Management Strategies for Mid-Market Security
Intruder’s Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/rethinking-vulnerability-management-strategies-for-mid-market-security
-
How we made Trail of Bits AI-native (so far)
Tags: access, ai, application-security, attack, automation, blockchain, business, ceo, chatgpt, computer, computing, conference, control, data, email, germany, government, identity, injection, jobs, macOS, marketplace, nvidia, open-source, risk, service, skills, strategy, supply-chain, technology, threat, tool, vulnerabilityThis post is adapted from a talk I gave at [un]prompted, the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides. Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead.…
-
8 ways to bolster your security posture on the cheap
Tags: access, attack, authentication, awareness, breach, ciso, control, credentials, cyber, cyberattack, cybersecurity, data, data-breach, ddos, dkim, dmarc, dns, email, endpoint, exploit, finance, google, identity, Internet, metric, mfa, microsoft, mitigation, okta, passkey, password, phishing, risk, risk-management, service, strategy, technology, tool, training, update, waf, zero-day2. Take full advantage of your existing tools: A practical way to strengthen enterprise security without incurring additional significant spend is to ensure you’re fully leveraging the capabilities of solutions already present within your organization, says Gary Brickhouse, CISO at security services firm GuidePoint Security.”Most organizations have invested heavily in security solutions, yet most are…
-
Ransomware in 2025: Blending in is the strategy
A summary of the top ransomware trends from the Talos 2025 Year in Review, with a focus on identity, attacker tactics, and practical defenses. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/ransomware-in-2025-blending-in-is-the-strategy/
-
From Visibility to Action: Modernizing Security Operations with Cisco, Optiv, and Splunk
On Demand video from Cisco. As cyber threats grow more complex, organizations need security programs that work smarter, not harder. Hear how Optiv, Cisco, and Splunk combine strategy and technology to help security teams gain clarity, respond faster, and stay ahead of attackers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/from-visibility-to-action-modernizing-security-operations-cisco-optiv-splunk-a-31298
-
KI-Rausch und Qualitäts-Kater
Unternehmen investieren Milliarden in generative KI für die Code-Entwicklung. Doch wer investiert in das intelligente Gegengewicht, das für die nötige Stabilität sorgt? Ein Expertenkommentar von Roman Zednik, Field CTO bei Tricentis, der die vergessene zweite Hälfte einer erfolgreichen KI-Strategie beleuchtet und zeigt, warum der alleinige Fokus auf Entwicklerproduktivität gefährlich kurzsichtig ist. Ein historischer Budget-Shift […]…
-
vDefend’s Built-in Advantage: Enable Closed-Loop Lateral Security for Zero-Trust Private Cloud
Cybersecurity strategy now shapes how enterprises design cloud platforms, application environments, and core infrastructure. The financial stakes are significant. The next step is architectural: turning zero-trust strategy into foundational systems that enforce it by design rather than as an afterthought. In private cloud environments, that shift matters. Segmentation macro as well as micro .. First…
-
World Back Up Day 2026 What are the takeaways?
World Backup Day is often seen as a simple reminder to save your data, but this year, security leaders say backup strategies must evolve into fully tested, secure, and recovery-focused resilience plans. Here’s what organisations should take away from World Backup Day this year: 1. Backups are meaningless if recovery isn’t provenIt’s no longer enough…
-
Backups testen, schützen und wiederherstellen
Backups sind ein zentraler Bestandteil der Unternehmens- und Cyberresilienz Sie sollten nicht nur erstellt, sondern regelmäßig getestet und im Ernstfall zuverlässig wiederhergestellt werden können. Eine wirksame Backup-Strategie umfasst Schutz, Verschlüsselung, klare Wiederherstellungspläne sowie bewährte Vorgehensweisen wie die 3-2-1-Regel, da viele Datenverluste auf fehlerhafte Backups zurückgehen. Professionell gemanagte Backup-Lösungen etwa durch Managed Service Provider … First…
-
Can Agentic AI keep you ahead in cybersecurity?
Can Machine Identities Redefine Security? Understanding Non-Human Identities and Their Impact What if the key to future-proofing your cybersecurity strategy lies in managing machine identities effectively? Non-Human Identities (NHIs) have become fundamental to organizational security frameworks. Their significance cannot be overstated, particularly in sectors like financial services, healthcare, and travel, where NHIs support critical operations……
-
Google’s 2029 Quantum Deadline Is a Wake-Up Call
Google’s Accelerated PQC Timeline Demands Enterprise Action Now. Google set a public deadline for migrating to post-quantum cryptography, setting a strong signal for IT and security leaders that they too should transition their encryption into more robust algorithms. Enterprises need a migration strategy now before the window closes. First seen on govinfosecurity.com Jump to article:…
-
How are NHIs supported in regulatory compliance?
Can Effective Non-Human Identity Management Elevate Your Compliance Strategy? The management of Non-Human Identities (NHIs) has become a crucial aspect of regulatory compliance. NHIs, often referred to as machine identities, play an integral role in securing digital infrastructures. They are composed of an encrypted password, token, or key (the “Secret”) and the permissions granted by……
-
The CISO’s guide to responding to shadow AI
Tags: ai, breach, business, ciso, cybersecurity, data, governance, guide, mitigation, privacy, risk, strategy, technology, tool, training, updateUnderstand why AI is being used: If CISOs want to manage shadow AI effectively, they need to understand why it keeps popping up. The immediate reaction may be to shut down the use of shadow AI, but there must be more to the response than that.”Our focus is understanding why they’re using it, educating them…
-
CrowdStrike AgentWorks Expansion Gives ‘Big’ Boost To Security For Partners: CEO George Kurtz
CrowdStrike is aiming to enable partners to accelerate their strategies around building security agents with a major new expansion to the Charlotte AI AgentWorks platform, CrowdStrike CEO George Kurtz tells CRN. First seen on crn.com Jump to article: www.crn.com/news/security/2026/crowdstrike-agentworks-expansion-gives-big-boost-to-security-for-partners-ceo-george-kurtz
-
7 Tipps für eine sichere WebsiteStrategie
Ihre Website ist Vertriebsplattform, Imagefaktor und oft geschäftskritisch. Doch was passiert, wenn sie plötzlich offline ist? Haben Sie ein aktuelles und funktionierendes Backup der Website? Ob durch fehlerhafte Updates, Hackerangriffe oder menschliche Fehler: Eine zerschossene Website oder ein kompletter Website-Ausfall kommt meist unerwartet und schneller, als man denkt. Trotzdem wird das Thema Backup oft […]…
-
Warum Unternehmen die 31Methode nutzen sollten
Die 3-2-1-Backup-Strategie ist eine technische Mindestanforderung für resiliente IT”‘Infrastrukturen, da Datenverluste durch Ausfälle, Fehlkonfigurationen oder Ransomware erhebliche Betriebs”‘ und Compliance”‘Risiken verursachen. Sie basiert auf drei Datenkopien auf zwei unterschiedlichen Medientypen, davon eine räumlich getrennte, idealerweise offline oder immutable, um Single Points of Failure zu vermeiden. Entscheidend sind regelmäßige Restore”‘Tests sowie klare RPO/RTO”‘Definitionen, denn nur verifizierbare……
-
What innovative methods secure Agentic AI?
How Can Non-Human Identities Securely Navigate Digital? Understanding the nuances of Non-Human Identities (NHIs) in cybersecurity is crucial for organizations striving to secure their assets. The management of NHIs, primarily those used within cloud environments, has emerged as a pivotal aspect of cybersecurity strategies, requiring nuanced approaches and innovative solutions. But what exactly are NHIs,……
-
Cybercrime Disruption Demands Global Trust and Coordination
UK Cyber Official Paul Foster on Cross-Border Takedowns, New Disruption Playbook. Dismantling cybercrime groups requires more than technical capability. It demands trust, coordinated strategy and cross-border collaboration, says Paul Foster, head of the National Cyber Crime Unit at the U.K.’s National Crime Agency. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cybercrime-disruption-demands-global-trust-coordination-a-31172

