Similarities And Differences Between XDR And SIEM

by: Andrew Hollister, Forbes Councils Member Sr. Director of Labs and Advisor to the CSO at LogRhythm The technology industry in general — and cybersecurity in particular — is awash with jargon, abbreviations and acronyms. One of the acronyms currently gaining traction is XDR (extended detection and response). On the face of it, XDR appears to have very similar aims to a security information and event management (SIEM) platform, so let's take a look at...

Read More
De-Risking Microsoft 365 Against Attacks and Downtime

A new survey shows enterprise CISOs want more security systems and services that fortify Microsoft 365 to protect valuable data and business continuity.   by Thom Bailey Companies have a lot riding on Microsoft 365 — not just email, collaboration, and productivity applications but the valuable business data produced by the workers who use all those apps. This investment in M365 has only increased with the growth of remote work, elevating...

Read More
SecurePATCHING Managed Service by Secure Sense

Unpatched systems are the most common technological factor in breaches and loss of productivity. Unfortunately, solutions to patch related risks are often themselves costly in terms of identifying and purchasing quality products, staffing and expertise. Almost two-thirds of breach victims report being breached due to unpatched, known vulnerabilities and many of these victims were unaware that their organizations were vulnerable in the first place. Over half of the impacted organizations rely...

Read More
Asset Discovery and Inventory: 10 Ways Tanium Makes it Fast, Complete and Accurate

By Tanium Staff Asset discovery and inventory — or the process of maintaining a complete, accurate and up-to-date inventory of your IT assets — is more challenging than ever before. Even with proper asset discovery tools, you are managing an environment with an enormous volume of globally distributed assets with complex dependencies — each of which can either fail and lead to performance loss, or be compromised and result in an enterprise-wide security...

Read More
Predictions for 2022: Tomorrow’s Threats Will Target the Expanding Attack Surface

By Derek Manky at Fortinet According to FortiGuard Labs, 2022 is shaping up to be a banner year for cybercriminals, with ransomware on the rise and an unprecedented number of attackers lining up to find a victim. Attacks will continue to span the entire attack surface, leaving IT teams scrambling to cover every possible avenue of attack. This will be incredibly challenging because the attack surface will simultaneously be expanding as organizations transition to...

Read More
Security Technology: SD-WAN

Welcome to the last week of Cyber Security Awareness month! So far, we’ve really focused on being cyber aware in regards to current types of threats (phishing and ransomware for example) and the importance of training staff and being prepared for anything. Being “technology aware” is vitally important for today’s organizations as the threat landscape (and threat surfaces) evolve rapidly. Most organizations recognize a daunting number of best practices and security requirements,...

Read More
Security Awareness Training

Welcome back to cyber security awareness month with Secure Sense! Due to the current climate, many organizations have transformed their business to run mainly online, and may even have moved their employees to work completely remote. It’s extremely important to regularly keep up on cyber security training for staff as the risk of cyber attacks continue to rise. Cyber Security Awareness month makes for a great time to review your cyber...

Read More
PwnedPiper: Armis Identifies Nine Vulnerabilities in Hospital Infrastructure

Swisslog Healthcare, the providers of the leading solution for pneumatic tube systems (PTS) in North America, released a statement yesterday regarding nine vulnerabilities in their Translogic PTS system identified by Armis. Swisslog Healthcare's Translogic PTS system is used in over 80% of hospitals in North America and over 3000 hospitals worldwide. PTS systems play a crucial role in patient care, and are utilized nearly 100% of the time. The potential vulnerabilities were...

Read More
Examining the Role of Zero Trust Access in OT Security

By: Rick Peters, CISO Operational Technology, North America, Fortinet This is a summary of an article written for Automation.com by Rick Peters, CISO, Operational Technology North America at Fortinet. The entire article can be accessed here.  As operational technology (OT) networks become increasingly connected to the rest of an organization’s network infrastructure, they become a growing target for increasingly sophisticated cyber criminals. In fact, Fortinet’s 2020 State of Operational Technology Cybersecurity Report indicates that nine out...

Read More
Introducing the new Secure SD-WAN Managed Service from Secure Sense

Secure Sense, a subsidiary of TELUS, has partnered with Fortinet to power our new Secure SD-WAN managed solution. The service offers comprehensive built in security, designed to easily integrate into your existing infrastructure, giving you the ability to eliminate security gaps in your network while gaining the benefits of improved connectivity experience and cost efficiencies of SD-WAN. Gain peace of mind knowing your environment is operating optimally and according to...

Read More