TAP Into Technology Blog: IT Security (4)
Adding Visibility to Improve Network Detection and Response (NDR)
Network detection and response (NDR) is a discipline that evolved out of what was once known as network traffic analysis. Basically, as network traffic became more complex—and more potentially malicious—network traffic analysis had to take...
How Healthcare Providers Can Fight Back Against Cyber Attacks
When it comes to industries that are under threat from cyberattacks, healthcare ranks near the top. Although attackers love to steal banking and payment information, data stolen from healthcare organizations can be up to fifty times more...
Ensuring Success of New Federal Zero Trust Initiatives
With high-profile cyber attacks on federal assets and critical infrastructure on the rise, the US Federal Government has shifted to a proactive posture in confronting these threats. The Department of Homeland Security’s Transportation...
Closing the Visibility Gap for Financial Cybersecurity Threats
Financial institutions are a storehouse of attractive data for attackers. Although most attacks against financial organizations don’t necessarily succeed in emptying coffers outright, other information—such as PII (Personally identifiable...
MITRE ATT&CK: The Magic of Segmentation
In cybersecurity, nation-states, cybercriminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and...
Building Trust After Supply Chain Attacks
If you’re in charge of defending the average enterprise, your supply chain might be your least-defended attack surface. In the language of information security, your supply chain is any vendor or service provider with a password, and...