Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

Four Essential Requirements for Modern Data Security

This article was originally featured on the IBM Security Intelligence blog. To read the original article in its entirety, click HERE. There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally…

Supply Chain Attacks and Vaccine Hacking – CrowdStrike Global Threat Report Reveals the New Normal in 2021

The recently released CrowdStrike 2021 Global Threat Report (GTR) provides a stark but comprehensive outline of the ongoing threat landscape facing modern cybersecurity professionals. Hot off the heels of, “a year of hardship and grief for many,” CrowdStrike’s annual report…

Five ways to protect your VPN gateway from DDoS attacks

It’s already difficult to remember when working from home wasn’t the practice for many workers. As this new reality set in, organizations of all stripes had to increasingly rely on their network connectivity to continue business-as-usual activities. According to a McKinsey survey…

Global Threat Report Shows Malicious Actors Went Big Game Hunting in 2020

Earlier this month, the global cybersecurity firm, CrowdStrike, released their 2021 Global Threat Report, which provides a detailed, in-depth picture of the current threat landscape facing organizations today, an overview of threat activity from the past year, and recommendations for…

Work from home and neglected clouds – CrowdStrike Services Report shows 2020 was a virtual playground for hackers

Earlier this month, CrowdStrike released its annual CrowdStrike Services Cyber Front Lines Report, a report that outlines the trends that the firm identified from client engagements and key cybersecurity themes identified from the prior year. Candidly, it’s a report that…

31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

With cloud migration rampant, it’s time to take cloud security seriously

There’s good reason why the cloud migrations are among the top priorities for government CIOs and IT departments today. The benefits of the cloud are numerous and impossible to ignore. The cloud gives the government increased scalability and flexibility in…