Blog

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more

Scorecarding in the Age of Threat

There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security scene for five years as IT admins looked for a simple and fast answer to a critical question: how safe is my network? The answer was to monitor critical aspects that would serve as key indicators on…
Read more

First You Secure, Then You Score!

You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks. It’s a natural behavior for us humans, to be a bit skeptical. Better to be sure by testing, checking, trying. It’s a similar feeling with implementing a firewall. You fire it up and if it…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is racing to remove them. But IAM is much more than that—it combines key areas: Secure Authentication —facilitating the multi-factor authentication in a user-friendly way, Network…
Read more

Authentication Is What You Do As Much As Who You Are

We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different sites that we navigate. And because our brain craves simplicity, we typically use the same password for all those sites. We make them easy to…
Read more

The New Threat Is You

How cybersecurity has Evolved: a View from the Trenches. Sometimes I hear the words ’20 years in the business’ and think that sounds so substantial; so long. Fully half my life has been spent in the world of cybersecurity: creating software to protect networks, analyzing the expanding threat surface and how it has morphed. It…
Read more

Seeing the Wolf in the Herd: Analytics In the Age of Ransomware

In 2019, one of the most severe ransomware attacks ever reported happened to a Scandanavian aluminium supplier, costing almost €75 million in damages. But they’d rather that then pay the ransom. Also, it’s a tale of how predictive analytics is coming to the fore in ransomware prevention. This is their story. It was a sunny…
Read more

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will they pass the peak of the Hype Cycle and deliver more true business value and improved security in 2020? AI at its best  The truth is that AI is a very diverse beast. It has…
Read more

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time and effort. Running an efficient network is a big challenge as it requires the administrator to take tight control of each packet, analyze it and take appropriate action. It’s tempting for an IT administrator to use the…
Read more

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home, or in this case to the attack perpetrator.  Security analytics is a vital part of managing your cybersecurity solution: without analytics there is no way to understand your true protection status. Vendors providing full stack solutions is a…
Read more