Five technology and security books I’m reading to start the new year

wall-of-books

Trying to keep up on the latest technology and security developments is never-ending. The number of articles, expert interviews, books, blogs, videos, presentations, podcasts, and documentaries we need to watch to keep up also seems endless. Still, there’s nothing like a good book for an expert deep dive on a topic, which is why I […]

Man the barricades? The future of the network fortress

zero trust network

In the Middle Ages, technical and economic forces brought to an end centuries of military theory, as city walls became ineffective, irrelevant and even counterproductive. A similar disruption is happening now, but this time inside corporate networks. Enterprise network as the fortress Managing information security for corporate networks has always been difficult. For starters, the […]

Protect your business by orchestrating and automating security operations

Organizations today face an unprecedented number of security threats, and the risks will only increase as employees, customers and partners embrace new trends and innovations on their road to digital transformation. These changing and growing threats mean that traditional security methods – techniques that defend the enterprise with moats and walls and monitor for things […]

CEO fraud: With billions lost, is your organization at risk?

CEO Fraud social engineering CSC BlogsCEO Fraud social engineering cybersecurity CSC Blogs

Social engineering is one of the most popular and oldest scam techniques that actually works. As we have already moved on to the cyber age, where our financial records, research and development data, social life or medical history exist online, it is really crucial that this kind of information does not fall prey to fraudsters. However, it […]

Enterprise security still overlooking this weak link

web application security CSC Blogs

Every year, Web-based attacks are among the most popular attack vector against enterprise data. Of course, the layer of the technology stack where attackers focus their attention changes over time. When viruses and malware were spread by disk, exploitation was primarily aimed at the operating system layers. That changed as systems became connected, and enterprises […]