Steps to building a mature threat-hunting program

Cyberattacks are more sophisticated than ever, with hackers and other cybercriminals able to find and exploit the smallest vulnerabilities to enter corporate environments.  They’re learning new ways to enter corporate networks and systems without security teams even being aware of their existence, so they can inflict damage or steal data for profit. Meanwhile, security leaders…

Data is everywhere. But can you find it?

Most regulatory acts require that owners of sensitive data must always know where the data is currently stored, what state it’s in, and how well protected it is. Two primary concerns surround the importance of having this knowledge — security and compliance, and they’re not the same thing. Security Information security refers to practices that…

Wrangling ESG data: The CIO’s next challenge

Many organizations vest responsibility for creating what are usually called environmental, social, and governance (ESG) reports in a corporate sustainability officer or similar title. But lately there has been a growing call for CIOs to play a larger role in ESG efforts, especially when it comes to meeting increasingly rigorous ESG standards and frameworks. In…

5 tips for making hybrid work in IT

When COVID-19 hit, IT had to adjust its internal processes and procedures, logistics, and security policies at the same time it was helping the rest of the organization pivot to a full work-from-home environment. Then, adding additional complexity to an already difficult situation, along came The Great Resignation, where many employees, particularly baby-boomers, decided not…

Passwordless MFA: The Single Way To Mitigate the Top 5 Threats to Your Customer Identities

https://vod-progressive.akamaized.net/exp=1651270285~acl=%2Fvimeo-prod-skyfire-std-us%2F01%2F603%2F28%2F703018738%2F3254490927.mp4~hmac=3d37e94b5147ebebf79eb9ff5cced9221a79e49078812f5d08a954330b685f97/vimeo-prod-skyfire-std-us/01/603/28/703018738/3254490927.mp4 Consumers are increasingly targeted by cybercriminals that use various techniques in account takeover (ATO) attacks. These attacks threaten the security of their online accounts and personal data. Consumers understand this, too. According to Experian’s 2021 Global Identity and Fraud Report[1], 55% of consumers say security is the most important aspect of their online experience.…

Sovereign Clouds: Partner Perspectives on Safeguarding Critical Customer Data

As VMware gains momentum with their sovereign cloud initiative , we turned to leading partners AUCloud, Datacom, STC, NxtGen, TietoEVRY, ThinkOn, and UKCloud and their customers to find out why a sovereign cloud is essential. With new national data protection and privacy laws continuing to take shape across the globe and penalties confirming the punitive power of existing regulations, it’s no surprise that highly regulated…

How Enterprises Boosted AI Through Infrastructure Upgrades

Many enterprises around the world are discovering new insights, revenue and efficiencies through the use of artificial intelligence (AI). At the same time, companies are discovering that they can accelerate their projects by adjusting their infrastructure approach. These changes have helped to create new opportunities and growth options, as well as preventing a trip to…