The rise of cyber security product sprawl

security sprawl

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew […]

One key step to protecting at-risk enterprise applications

StrikeForce penetration testing CSC Blogs

Cybercrime is growing, and the perpetrators are becoming more sophisticated. Worse, they’re getting really good at networking – sharing techniques, code and successes that can multiply the effects of an attack exponentially. Just last month, the huge Mirai attack launched a bot army of IoT devices on critical Internet infrastructure that supports big-name websites such […]