With the NBA draft upcoming tomorrow, our #CyberDraft2019 series is back to help you find the Zion Williamson of cybersecurity and configure your team and to make a title run like the 2018-19 Toronto Raptors.
Continuing on our “basketball meets cybersecurity” theme, we now find ourselves around the corner from the NBA draft. Just as with our previous #Threat16 March Madness challenge - if you adopt the right perspective, there are so many unexplored parallels between cybersecurity and sports.
Nearly every enterprise must tackle significant requirements these days around data protection and evolution of related DLP capabilities, but those companies tasked with defending their lifeblood intellectual property face even greater DLP Optimization challenges. From insiders that may either intentionally or unintentionally leak their latest R&D or product secrets outside company “walls”, to persistent threats […]
Newsflash – there will never be a one-size-fits-all solution when it comes to addressing enterprise security requirements. At the same time, best practices shared among leading security practitioners will always shine a light on what’s working in terms of both emerging and proven techniques. To that end, building out capabilities that enable automated threat hunting […]
Redemption. Remember that word? The University of North Carolina claimed it back in 2017, and we thought we would share it with our ACC brethren Virginia this year after they got knocked out in the first-round last season (OK, so, that wasn’t really the plan here in Chapel Hill, but…). This year’s overtime thriller will […]
An exciting first week of the NCAA tournament yielded a pretty compelling set of regional finals as down went Duke [my personal favorite as a UNC fan]. Now, let’s hope that both the real world and cyber-security Final Four showdowns are just as impressive! In the cybersecurity #Threat16 virtual tourney, the match-ups also lived up […]
It’s no secret that there’s a massive cybersecurity skills gap. This has been reported for many years and recent reports indicate there’s no sign of it slowing. In fact, the 2018 Cybersecurity Workforce Guide published by (ISC)² contends that the gap actually continues to widen. The report estimated that the shortage of cybersecurity professionals reached […]