As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape. According to Dan Turner, CIO at Per Mar, the evolution of the Cisco security portfolio has helped the company remain cyber resilient during the pandemic and beyond. We recently spoke with Turner to discuss how Per Mar uses Cisco technology to … [Read more...] about Per Mar Security remains resilient as threats evolve
security
APM Vision for Open Source and Security
Earlier this month, we shared exciting news with our first placement in the 2022 Gartner® Magic Quadrant™ for Application Performance Monitoring and Observability: we are in the Visionary Quadrant. This research is near to my heart, as I led this research for four years; so, I wanted to reflect on why this is an accurate placement for Logz.io. The Visionary Quadrant is … [Read more...] about APM Vision for Open Source and Security
People: A cornerstone for fostering security resilience
Security resilience isn’t something that happens overnight. It’s something that grows with every challenge, pivot and plot change. While organizations can invest in solid technology and efficient processes, one thing is critical in making sure it translates into effective security: people. What impact do people have on security resilience? Does the number of security employees … [Read more...] about People: A cornerstone for fostering security resilience
Security resilience: 4 ways to achieve company-wide buy-in
There are some very tough questions I’ve come across in my time. How does one walk into Mordor, if not simply? Why isn’t there a special name for the tops of your feet? (Credit to Lily Tomlin for that one.) For a security leader, the toughest questions are often around security buy-in: How do you achieve active support across the organization for building resilience? Is there a … [Read more...] about Security resilience: 4 ways to achieve company-wide buy-in
Automating the Security Protections rapid response to malware
Cyber attacks on corporate networks were up 50% in 2021, and it’s expected that 2022 will see more of the same. Elastic Endpoint Security includes a variety of protection layers to ensure maximum coverage against different types of malware. There have been a few examples recently of the need for fast, accurate updates of user environments in order to protect against the latest … [Read more...] about Automating the Security Protections rapid response to malware
Security Resilience for a Hybrid, Multi-Cloud Future
Eighty-one percent of organizations told Gartner they have a multi-cloud strategy. As more organizations subscribe to cloud offerings for everything from hosted data centers to enterprise applications, the topology of the typical IT environment grows increasingly complex. Now add the proliferation of hybrid work environments, the rapid ascendance of Internet of Things (IoT) … [Read more...] about Security Resilience for a Hybrid, Multi-Cloud Future
GitLab Issues Security Patch for Critical Account Takeover Vulnerability
GitLab has moved to address a critical security flaw in its service that, if successfully exploited, could result in an account takeover. Tracked as CVE-2022-1680, the issue has a CVSS severity score of 9.9 and was discovered internally by the company. The security flaw affects all versions of GitLab Enterprise Edition (EE) starting from 11.10 before 14.9.5, all versions … [Read more...] about GitLab Issues Security Patch for Critical Account Takeover Vulnerability
SecureX and Secure Firewall: Integration and Automation to Simplify Security
Cisco Secure Firewall stops threats faster, empowers collaboration between teams, and enables consistency across your on-premises, hybrid, and multi-cloud environments. With an included entitlement for Cisco SecureX, our XDR and orchestration platform, you’ll experience efficiency at scale and maximize your productivity. New streamlined Secure Firewall integrations make it … [Read more...] about SecureX and Secure Firewall: Integration and Automation to Simplify Security
Security of third-party apps for connected cars
Any modern car is basically a computer on wheels. And many are also connected to the internet. As a result, in addition to the vehicles themselves, automakers are now developing apps to control them remotely. These can be used to check the car’s location, turn on the heating or air conditioning in advance, lock and unlock the doors, and so on. However, different users have very … [Read more...] about Security of third-party apps for connected cars
Yes, Containers Are Terrific, But Watch the Security Risks
Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don't mitigate these risks are vulnerable to attack. In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the … [Read more...] about Yes, Containers Are Terrific, But Watch the Security Risks