Security

News, trends and insights for cybersecurity in the digital age

How mesh networking ensures uninterrupted data exchange between connected devices

mesh network

One of the major challenges with connected devices is having a reliable network. Cell phone and standard Wi-Fi networks do not guarantee communication everywhere. Even dense urban  areas have numerous “dead” cellular zones in building basements, elevators, tunnels and underpasses. Remote areas like crop fields, mines, oceans and space also pose problems. With this in […]

The three key principles of a digital security strategy

data strategy CSC Blogs

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to deliver innovative new business models, create new digital customer experiences, and optimize and automate their processes to enhance business performance. BUT…digital technologies and the rapid pace of change […]

Enabling a secure ecosystem of connected devices

The number of connected devices is predicted to grow to 75 billion by 2025. This will create a massively connected ecosystem, and data security will be paramount. Many of these devices will be cyber-physical systems, which closely integrate computation, networking and physical processes. The devices consist of a physical entity and its cyber twin, which […]

Moving toward a consistent framework for digital security transformation

password security CSC Blogs

By Curtis Price, IDC Organizations pursuing digital transformation initiatives are typically doing so to achieve a variety of possible business outcomes ranging from improved customer experience to improved operational efficiency. As enterprises plan their digital journeys, they are increasingly moving to a more distributed IT environment where corporate applications reside on premises as well as […]

Making analysts better using AIRO in security operations

improvement-concept

By Curtis Price, IDC The traditional security operations model is rapidly succumbing to the challenges and dynamics inherent in today’s cybersecurity market. Over the last few years, organizations have deployed a myriad of security technologies to combat specific threats, and as a result have inherited a collection of point product solutions with very little interoperability. […]

Automating and orchestrating “SecOps” and integrating service management

orchestra-conductor

By Curtis Price, IDC Managing an enterprise’s security posture and mitigating risk continues to be a top of mind concern for corporate executives. Enterprises are not only spending more on technologies to prevent attacks, but also establishing procedures for quickly and effectively responding to a breach. However, as organizations develop holistic security strategies that span […]

Avoiding cyber attacks while on the road to digital transformation

No matter where your organization may be on its digital transformation journey, beware the dangers lurking along the way. Fellow travelers down this road have been waylaid time and again by cybercriminals wreaking havoc through ransomware, distributed denial of service attacks, data breaches and other types of attacks. Digitizing more core business processes, after all, […]

Reducing risk in digital transformation

Digital transformation and enterprise risk management can be thought of as parallel highways. That’s because any transformation effort will introduce new risks and change to the organization’s overall security posture. As organizations continue their digital transformations, the transformation of security and risk management must be an integral part of that journey. Organizations must integrate security […]

Cyber reference architecture: A security backbone for the enterprise

At the heart of digital transformation is data. The importance of protecting this critical business asset is bringing cyber security into sharp focus in the boardroom as well as the data center. In the past, an enterprise’s cyber security team focused on IT security risks and threats, with little reference to business risks, objectives and […]

Three ways to build a rapid-response culture in cybersecurity teams

cybersecurity-response

The phrase “need for speed” might sound like a catchy one-liner from a Hollywood blockbuster. However, when it comes to information security, they are words to live by. Consider this vital fact: Malware permeates organizations with lightning speed and frequently causes millions of dollars of damage in a relatively short period of time. Because of this, cybersecurity […]