Are hackers at the top of your naughty list this year? If so, you’re not alone. Watch DataEndure’s December 2021 TECH talk with Vice President of Managed Security Services, Brian Moody as he discusses the importance of re-evaluating your security profile. He’s got his list of top 3 Security Priorities & he’s checking it twice.
Phishing has always presented the largest attack surface for any security team, and it has increased dramatically since the beginning of the COVID-19 crisis. Due to the increased use of personal devices and work from home, attackers are targeting the weakest link in the chain, which is often individuals and their personal systems on insecure home/remote networks. Many organizations have phishing awareness and training platforms in place; yet given the… Read More
Whether it’s Halloween or cybersecurity, what looks like a treat can really be a trick. Organizations like yours need to stay vigilant with multiples layers of defense against those in disguise poking around your network looking to steal your data. Leaving all your lights off on Halloween may signal that you’re all out of candy, but it can also make you an easy target to vandals. Join us for our… Read More
We had a strong response to our last TECH talk, with a lot of people voicing their frustrations with Zero Trust. Among them, “ZTN doesn’t work” and “It’s too hard to deploy everywhere”. What if organizations are trying to solve this new challenge through a traditional lens? How might their opinion change if we started with a different framework to approach ZTN? Join DataEndure this month, where we discuss how… Read More
Join DataEndure as we “zero in” on zero trust, what it is, what it’s not – and how, for some, the reality of securing your enterprise perimeter composed of cloud and remote work locations might be closer than you think.
You care about the security of your business and the data of your customers, and you know how important it is to work with providers you can trust. If you’re currently working with a Managed Service Provider (MSP), you may have heard about your provider changing to a Managed Security Service Provider (MSSP) model. While some companies legitimately put in the work to complete the security requirements necessary to be… Read More
This month we feature an excerpt from a recent TECH talk where we go in depth about XDR. With cybersecurity, it’s all about time. It’s about an organization’s ability to go on offense to take the critical time advantage away from cyber adversaries. In 2021 this is more important than ever and XDR is central to this strategy.
In the world of cybersecurity, acronyms abound. Not only that, many describe technologies and concepts that are seemingly indistinguishable from one another. Take EDR, MDR and XDR. With cyberthreats at an all-time high, vendors are seeking a “Detection and Response” story, and work in a lot of creative angles to get there. While analysts and thought leaders might be able to work with this phraseology …. It has only served… Read More
You’ve undoubtedly heard the phrase before, “a (fill in the blank) is only as strong as its weakest link.” For organizations who have vendors and suppliers connecting in some form or fashion to their network, this statement has played out many times – with consequences ranging from brand damage and lost revenue to severe regulatory penalties. Ever-evolving technologies, threats, regulatory laws and business growth require ongoing GRC efforts that strain… Read More
With the cyberattack landscape changing daily, deciding how to allocate valuable time and budget in security tools has become a constant challenge. Yet, tools are only part of the equation. True situational awareness depends on a practical and proactive approach to threat detection and response by integrating, correlating, and analyzing data across many security tools. When deployed effectively, this “telemetry” can give you significant time advantage – including time to… Read More