This year has brought dramatic and extreme change at every turn. The global COVID-19 pandemic has transformed business and life as we know it, accelerating the move to remote operations where employees work outside the protection of the corporate firewall. As we look ahead at what 2021 has in store with our annual cybersecurity predictions, we know cyber criminals will adapt to … [Read more...]
Search Results for: automation
The Role of Automation in Helping MSSPs Improve Security Offerings
It’s no secret that midmarket organizations face many of the same security challenges as enterprises, but often without the same level of resources to combat them. When these midmarket security challenges are combined with the fact that the global workforce is increasingly becoming more decentralized (accelerated by the current health crisis), new hurdles emerge and bring with … [Read more...]
Defeat Cryptojacking Malware with Responsive Automation
Responsive automation makes it possible to shorten time to detection and accelerate response by automating processes that typically require a skilled security analyst. For my money, there are few better examples of the value of responsive automation than the threat of cryptojacking malware. Cryptojacking malware infects a system with the goal of generating Bitcoins using the … [Read more...]
Are Security Automation Solutions “Trickling Up” from SMBs to Enterprises?
Everyone in the security industry knows that most new security technologies start off at the enterprise level, then “trickle down” to small and medium size businesses (SMBs) as they become more mature, less expensive and easier to deploy and manage. But does the process always flow in one direction? WatchGuard CTO Corey Nachreiner doesn’t think so. Corey wrote a column for … [Read more...]
Why Automation and Classification are the Keys to Defending Your Airspace
How can an organization protect its employees and customers from Wi-Fi attacks such as Karma or man-in-the-middle (MiTM)? The convenience of public Wi-Fi drives people to connect to it in droves, but hackers can take advantage of the lax security practices of most public hotspots to steal people’s information. How can we stop these attacks before they happen? In a … [Read more...]