The Center for Internet Security (CIS) Critical Security Controls makes a good effort to prioritize IT Security controls. This prioritized list of controls provides an implementation pathway that closes the biggest security gaps first. There are 20 controls in total, and CIS calls out the “First Five” as being the most fundamental controls for an […]

Read More

As Bob Dylan sang, “The times they are a-changin’.” This is certainly true when it comes to security technologies — just about every security monitoring tool and control is going through a profound transformation. Here are just a few examples: Endpoint security is evolving from signature-based antivirus to next-generation endpoint security suites.  ESG views endpoint security […]

Read More

A report in The Wall Street Journal says that hackers working for the Russian government stole sensitive documents from a NSA contractor’s home computer. The story goes on to say the contractor was targeted after the files were discovered by Kaspersky’s Anti-Virus software, somewhat explaining the U.S. government’s push to ban Kaspersky on its systems. […]

Read More

These days, nearly every security leader is seeking ways to improve her team’s threat detection capabilities. According to the RSA Threat Detection Effectiveness Survey, 75 percent of respondents are unsatisfied with their organization’s ability to detect and investigate threats. Security teams can pursue any number of strategies aimed at helping them detect threats faster, from […]

Read More

Leaderships’ evolving role in cybersecurity By Paul Gillin As the volume and severity of computer crime has grown, one group has stayed somewhat quiet about the issue: CEOs. Cybersecurity is a difficult topic for many business executives to discuss. They aren’t comfortable with the technology and they worry that speaking out will betray their naïveté. […]

Read More

There’s no question cloud applications can dramatically simplify and streamline how users get what they need to work effectively. But are you worried about how the cloud can complicate IT, with so many more apps and users in places outside your control? Take a deep breath: You can smooth your journey to the cloud and […]

Read More

How many times a day do you check email? We know that web trackers snoop and stalk us when we surf, but the same could be said of email tracking. In fact, it’s much more intense than you likely realized according to “I never signed up for this! Privacy implications of email tracking” (pdf); the […]

Read More

As dramatized in the HP Studios video series The Wolf, printers represent some easily exploitable security vulnerabilities. All too often, printers aren’t monitored in the same way as other networked devices. That can leave sensitive documents susceptible to tampering or fraud. So what security measures should your organization implement to protect confidential documents? That’s the question we […]

Read More

Everybody is connected these days, whether they’re roaming the halls of a hospital or working on their home Wi-Fi. IT departments are working intently to ensure only authorized personnel gain access to the corporate network. But often overlooked are documents left unattended in printer trays by remote workers. Just like electronic data, paper documents are […]

Read More