TAP Into Technology Blog: IT Security (5)
Building Trust After Supply Chain Attacks
If you’re in charge of defending the average enterprise, your supply chain might be your least-defended attack surface. In the language of information security, your supply chain is any vendor or service provider with a password, and...
Pharmaceutical Cybersecurity and Visibility are as Critical As Ever
The coronavirus (COVID-19) pandemic has been a harrowing experience in many ways, but it’s also given the pharmaceutical industry the chance to shine. In the United States alone, three companies have been able to roll out highly effective...
How Visibility Fuels Network Detection and Response in the Cloud
Enterprises are in the early stages of migrating to the Cloud. As they migrate, the initial cybersecurity focus tends to be on compliance and reducing the potential attack surface. As the migration evolves, the focus may expand to securing...
How to Prevent Ransomware Attacks On Industrial Networks
Ransomware Slams Westrock & Other Industrial Organizations Since the outbreaks of Wannacry & NotPetya ransomware attacks in 2017, we've been witnessing daily occurrences of attacks affecting OT networks that originated on the IT side. The...
10 Cybersecurity Visibility Best Practices
2020 was challenging in many ways, from a rapid influx of remote working, the maturity of 5G computing, IoT/OT infrastructure, Edge and Cloud environments to the threats that come with them. According to AT&T Cybersecurity Insights™ Report...
SASE: Redefining the Traditional Security Model
The perimeter-less, cloud-based working environment was always inevitable, but most thought leaders scheduled this revolution for sometime around 2025. With the advent of remote work, and with the prospect that no one will quickly return...