Security
January 20, 2021
Targeting IoT devices may help hackers gain access where it’s least expected. Hear from Sirius Security and IoT experts as they explain how IoT devices may be impacted, and steps you can take to reduce your risk.
The new, “smart” normal brings with it new safety measures, automated processes and a continued focus on efficiency as organizations strive to do less with more—but enhanced workplace safety may require enhanced security as well. How can you be sure that your new, “smart” devices or areas are secure?
Protect your healthcare system from cyberattacks. Here are three of the most impactful controls against ransomware that need to be part of your security strategy.
Access anywhere, anytime is challenging firewalls designed to protect a physically-defined network. See how the firewall ecosystem is evolving and adapting.
Before you select an email security platform, take a look under the hood to ensure that you are getting these fundamental features.
A modern security architecture no longer relies on trusted networks. Instead, identity is our authenticator; cloud is now a major component; and firewalls are transforming and adapting.
Learn how you can improve your email security program and what questions to ask to select the right vendor to help you implement it.
The Office 365 ATP provides a good security blanket, but only whole-solution providers can tailor a comprehensive security solution to meet an organization’s specific needs and use cases. Find out the five must-haves to look for in a reliable provider.
How do you identify any gaps or vulnerabilities in your email security strategy? Evaluating your current email security practices through these three lenses is a must.
Learn how implementing a thermal imaging solution can help maintain a safe work environment for your employees and customers.
Insider attacks are one of the biggest threats enterprises face. Is your organization doing enough to address them?
Rally around your most critical information. Learn how organizations can advance their security by focusing their "crown jewel" data.
Securing the connection of home-based employees to corporate resources is more important than ever. These steps will help secure employee-owned and BYOD systems.
WEBINAR - Learn how to eliminate security blind spots in encrypted traffic, deal with increasing SSL/TLS traffic, and maintain data privacy and regulatory compliance with Cisco NGFW or Cisco WSA plus F5 SSLO.
INFOGRAPHIC — Check out these five tips on how top-down security automation can transform your IT capabilities and enable your organization to implement a consistent, reliable security infrastructure.
Ease your cloud security complexity with a strategic security automation program, that when properly planned and employed, will enable your organization to implement a consistent, reliable security infrastructure.
Read our list of seven important cybersecurity trends for 2020—covering everything from users to cloud vendors to new data regulations—and our recommendations for taking a proactive approach to each one for better security now and into the future.
Las Vegas was the epicenter of the information security industry the first week of August when 19,000+ people were in town for Black Hat 2019. We’ve rounded up some thoughts, comments and insights from the Sirius security experts who attended.
Does your cybersecurity strategy need a reboot? Read about the six things you should consider to build a solid healthcare security plan for 2020.
To ensure effective security, you need to establish exactly what you’re trying to protect.
PODCAST — No matter how wildly a pinball bounces, it can't go outside the boundaries of the game. Your cloud security layers can make the same restrictions.
WEBINAR — Watch this webinar on-demand to learn how you can stay ahead of data privacy threats and keep up with the GDPR mandate and other compliance regulations.
Learn how a digital workspace solution can help you streamline your remote workforce needs, while easily managing data and keeping it secure.
PODCAST — Listen in to learn how organizations can gain an understanding of digital workspace solutions.
Learn what your organization can do to protect personal data and comply with regulatory requirements such as GDPR and CCPA.
The future of the data center lies in analytics. Digital transformation has completely altered the landscape of business today, making customers more connected than ever before.
PODCAST — Looking to strike a smarter balance between on-prem workloads, running on private cloud, and workloads in the public cloud?
PODCAST — Organizations that embrace digitization and invest in better technology become more secure and better prepared to take on the ever-changing pace and demands of the digital era.
Discover top cybersecurity trends for 2019, and actions that your organization can take to address them.
INFOGRAPHIC — Embracing digitization is the first step to developing a future-proof enterprise network that is not only intelligent, scalable and secure but also capable of operating and evolving in line with the ever-changing pace of today’s digital era.
PODCAST — Learn how to accelerate the rollout of innovative new applications while defending against the exploitation of increased attack surfaces and better managing web application risk.
PODCAST — While passwords remain a critical part of security, they are not enough to verify identity and keep data secure. Learn how risk-based multi-factor authentication can help organizations better protect end-user identities.
Learn how to overcome challenges with digitizing enterprise networks and become better prepared for seamless integration into future-state IT.
How to use encryption wisely and avoid common pitfalls.
Learn how your organization can securely manage IoT devices.
Learn how to advance cybersecurity throughout your supply chain.
PODCAST — Learn how to find solutions that can protect sensitive data and empower employees to work across devices and networks safely.
Learn how your organization can make access hard for hackers but easy for users with adaptive multi-factor authentication.
PODCAST — As governance changes, businesses are required to keep more information and for longer periods of time, all while combatting new and constant threats. Two industry experts give us a crash course in building a data protection plan.
Businesses must constantly reassess their data protection strategies in order to keep pace with the changing IT landscape. Begin with the basics.
PODCAST — Learn how to streamline operations and decrease the time it takes to detect and remediate security incidents.
Black Hat and DEF CON offer organizations a glimpse at the latest cybersecurity research, threats, and trends.
Attackers will never stop looking for vulnerabilities to exploit. Learn three important steps your organization can take to better protect web applications.
Learn how data loss prevention can transform sensitive data into an operational asset.
WEBINAR — Organizations are suffering from cyber fatigue, with too many alerts, too many technologies, and not enough people. Learn how to start building your next-generation security operations center.
A well-run security operations center (SOC) is at the heart of cyber defense. Learn how to choose a SOC model that aligns with your business objectives.
As of May 1, 2018, Sirius and Forsythe are officially one company. Together, we will offer a more robust portfolio of services and solutions for clients, delivered by the brightest minds in the business.
Learn how defensive deception can help level the playing field with cyber attackers.
PODCAST — Learn how Zero Trust architecture is helping companies prevent the exfiltration of sensitive data and defend against modern cyberthreats.
These 10 things can help your organization bolster security strategies.
Zero Trust Architecture can help organizations maximize data security. Let's debunk the myths so you can build a stronger security solution that aligns with the needs of your enterprise.
Learn how to protect your organization's crown jewel data.
Learn about key cybersecurity trends for 2018 and the actions your organization can take to mitigate the risks they present.
Learn how to arm your organization with the tactical, operational and strategic insights you need to develop a holistic picture of how you are being targeted, and by whom.
PODCAST — As The Internet of Things (IoT) evolves, so must risk calculation and security strategies. Get an inside look at the state of IoT security.
Learn how you can raise the productivity of security engineers and integrate the products required to defend against agile threats with automation and orchestration.
Not all convergence is the same. Find out whether convergence or hyperconvergence is right for your business.
PODCAST — Find out how your business can benefit from machine learning tools and stay secure in the process.
Learn how to accelerate the rollout of innovative new applications while better managing application risk.
WEBINAR — Discover the three keys to successfully address the EU GDPR & New York cybersecurity requirements.
If you missed VMworld 2017 in Las Vegas, there are some exciting changes that can help your organization. Here’s what you need to know about transforming your data center to deliver any application on any platform.
Mobile devices in the enterprise can pose major security risks. Here are five important risks worth examining and one key challenge to overcome.
Traditional defenses are no match for targeted attacks that bypass security controls and steal sensitive data.
Learn how targeted cyber attacks are threatening organizations in all industries, and how companies can protect themselves.
WEBINAR — Discover what you can do to help protect your endpoints.
Learn why evolving threats require increased endpoint defense capabilities, and how your organization can mature its endpoint security strategy.
PODCAST — As companies increase the adoption of IoT devices, cyber attackers continue to take advantage of the security risks they present.
WEBINAR — Learn how CASBs can help you avoid a cloud data nightmare.
PODCAST — The GDPR and similar regulations are changing the way companies should approach data security. Here's why enterprises should consider this an opportunity, not a nuisance.
Learn what these landmark regulations have in common, and how your organization can use them to increase consumer trust, and be more resilient going forward.
PODCAST — Cyber extortion is skyrocketing as ransomware grows in sophistication. Learn how your organization can take proactive steps to protect your data from WannaCry-like attacks.
PODCAST — When it comes to identity and access management (IAM), short cuts aren’t an option. With the right strategy, IAM tools can help you build effective security without sacrificing efficiency.
PODCAST — Many organizations continue to struggle with security implications associated with the cloud. Weaknesses in a cloud or colocation vendor’s security can have a dramatic impact on your organization’s overall security posture.
PODCAST — Applications have become an integral part of everyday life, and they contain some of your customers’ most confidential data. Explore how the rapid pace of development is affecting application security.
PODCAST — Compliance is essential, but it does not equal security. Learn how to help your organization become more secure and not merely compliant.
PODCAST — Knowing how cyber criminals think can give you a brand new perspective on your threat and vulnerability management.
PODCAST — Protect your data from evolving IT changes and targeted attacks by shifting a to data-centric security strategy.
Key trends and announcements from the world’s largest security conference.
Here's a roundup of our top security predictions for 2017, and what your organization can do to prepare for them.
Examine vulnerability assessments in the context of your business by following these key steps.
Learn how cloud access security brokers (CASBs) are providing organizations with visibility and control centered on SaaS applications.
Learn how key security issues and controls vary depending on the cloud model you're using.
Whether you are looking to unburden an overworked team or shore up your security strategy in the midst of an evolving threat landscape, working with managed security services provider (MSSP) for global, 24/7 coverage could be the answer.
WEBINAR — Sorting through threat data and operationalizing threat intelligence can be overwhelming. Here are six steps to getting started.
When operationalized properly, threat intelligence can be a powerful tool for enhancing the security of your data, your employees, your network and your enterprise.
IT security is like a chronic illness: it requires ongoing testing, treatment and re-evaluation. Learn more about the state of health care security and how the industry can better protect valuable data.
John “Chris” Inglis, former NSA Deputy Director and Chairman of the Securonix Advisory Board, shares his insights on the importance of vigilant preparation and a resilient incident response plan.
Learn how you can optimize your enterprise connectivity to meet service-level agreements, cut costs, and improve reliability in today's always-on, always-connected world.
Taking the initiative to build a strong incident handling and response strategy can be the key to defending your company’s data, reputation and future.
In this article, John Chris Inglis, former NSA Deputy Director and Chairman of the Securonix Advisory Board, shares his insights on how to protect your enterprise from insider threats.
Refocusing IT security efforts should be a top priority for organizations in all industries in 2016.
Learn why your organization should transition to a more secure hashing algorithm for your digital certificates as soon as possible.
When it comes to incident response, preparation is the name of the game. Learn how to develop a comprehensive approach to managing security incidents.
Your employees often won't think twice about trading security for high-speed WiFi. With new multigig wireless technologies, you can have the best of both worlds.
It's easy to overlook threats within your own business ecosystem. Learn why your company should form a strong insider threat strategy.
Discover how old and new technologies can work together to strengthen your core infrastructure security and threat/vulnerability management capabilities in part one of this IT security series.
Discover how data protection and identity and access management controls can help your business protect its "crown jewels" in part two of this IT security series.
It's time to replace the legacy security mindset with a more comprehensive approach. Explore how to establish repeatable, measurable security programs that focus on what's mission-critical to the business in part three of this IT security series.
Take the extra steps to protect you data from cyber attacks and internal mistakes.
The threat landscape shifts quickly. You perspective on security should too.
What can we learn from the LastPass hack? There may not be an easy answer, but there are key takeaways to keep in mind.
WEBINAR — No single security system can protect your organization from threats. You've got to adapt to survive.
WEBINAR — Seven elements can help you build a successful end-to-end encryption strategy.
Your data could be at risk. Find out how to protect sensitive information on your device.
An unsecure mobile phone puts your personal and corporate information at risk. Find out how to protect your enterprise.
WEBINAR — Changes to the organizational structure could be essential to free up resources who can identify, articulate and manage IT-related risks throughout the organization.
Understand this new threat and what steps your organization should take next.
A well-designed security program starts with developing and refining the organization's ability to manage risk.
An overview of the Virtualized Environment Neglected Operations Manipulation (VENOM) vulnerability and how you can protect your organization's information.
Exploring the link between organizational structure and risk management practices within today's enterprise.
WEBINAR — Learn the five keys to getting executive buy-in for IT security.
Learn why it is time for CIOs to rethink how they invest in IT. What are the best options for aligning your data center and IT infrastructure with the new operating financial model?
Learn how IT leaders can get the board of directors onboard with security and risk management.
Learn why the power of density is the future of your data center and how it can improve performance and lower costs.
The legal and practical issues surrounding cyber retaliation.
How identity and access management technology can help you protect your brand.
Find out how big data security can help enterprises better discover threats and protect themselves from cyber attacks.
How to build a bring-your-own-device (BYOD) strategy that balances compliance, security and access
Learn how IT organizations can more quickly and effectively serve the business.
Find out how automation can help IT departments become more strategic.
Stay up to date with the latest and greatest from our monthly newsletter