TAP Into Technology Blog: IT Security (4)
Developing a Single Source of Truth for Zero Trust
As federal agencies and companies move toward a Zero Trust model following recent executive orders to improve their cybersecurity posture, understanding your network’s ‘single source of truth’ is critical to building an effective Zero...
Adding Visibility to Improve Network Detection and Response (NDR)
Network detection and response (NDR) is a discipline that evolved out of what was once known as network traffic analysis. Basically, as network traffic became more complex—and more potentially malicious—network traffic analysis had to take...
How Healthcare Providers Can Fight Back Against Cyber Attacks
When it comes to industries that are under threat from cyberattacks, healthcare ranks near the top. Although attackers love to steal banking and payment information, data stolen from healthcare organizations can be up to fifty times more...
Ensuring Success of New Federal Zero Trust Initiatives
With high-profile cyber attacks on federal assets and critical infrastructure on the rise, the US Federal Government has shifted to a proactive posture in confronting these threats. The Department of Homeland Security’s Transportation...
Closing the Visibility Gap for Financial Cybersecurity Threats
Financial institutions are a storehouse of attractive data for attackers. Although most attacks against financial organizations don’t necessarily succeed in emptying coffers outright, other information—such as PII (Personally identifiable...
MITRE ATT&CK: The Magic of Segmentation
In cybersecurity, nation-states, cybercriminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and...