Security teams use database activity monitoring (DAM) to see what is happening with their critical data assets and to detect anomalies that can indicate misuse, theft, or tampering. As a process, DAM involves “observing, identifying, and reporting a database’s...
Cybersecurity
Tips for Getting IAM Implementation Right
A well-known quote says a “rose by any other name would smell just as sweet.” That may be true for some things, but it leaves too much to chance for cybersecurity. Establishing known identities is crucial to securing users, data, and devices. Identity and access...
How Synching Managed Providers Leads to Better Results
If you work with third-party IT and cybersecurity service providers, you already know how they can help you hurdle the challenges and costs of sourcing, retaining, and training in-house teams. The ease and efficiency delivered by managed service providers (MSPs) and...
A Strong Data Protection Program Starts With These 9 Cornerstones
The quest for strong data security has all the elements of a cliffhanger Hollywood movie. Bad guys, good guys, treasure, chaos, and misadventure are all part of protecting data in a digital world. Businesses and organizations have data, bad guys want it, and nearly...
TLS 1.3 Securely Raises the Speed Limit on the Internet Highway
What started as important is now vital. Protecting end-to-end web-based communications was important in 1983 when networks began to talk to one another via the Internet. It became vital when personally identifiable information (PII), payment card information, and...
2022 Pentesting: A Red Team Review
The ever-changing threat landscape is a popular topic for cybersecurity resources. An astonishing number of articles, whitepapers, and podcasts reference this in one way or another. And it’s true, shifting and emerging attack vectors and methods are a reality for...
PCI DSS v4.0 Is Coming: Here’s What You Need to Know Now
The Diners Club card was first issued in 1950 and heralded the beginning of the payment card industry (PCI). Cybersecurity became necessary for all transactions when the original carbon-copy impression payment slips evolved to magnetic stripes, EMV chips, and...
How a vCISO Helps Combat These Top 5 Security Concerns
Today’s organizations face a complex cybersecurity landscape, with hybrid networks pummeled by ever-morphing threats. The first chapter of this year is peppered with high-profile data breaches at T-Mobile, MailChimp, PayPal, and Chick-fil-A. Global geopolitical...