These past three weeks in the U.A.E. meeting clients and new prospects have been quite enlightening, some of the challenges and feedback resound again and again.
I have decided to cover some these topics in this week’s blog.
So, without any further delay, enjoy our roundup of stories for this week…
Notable Phishing Attacks of 2018... So Far
Vulnerabilities aren’t the only driver of web-based attacks, however. In its 2018 Data Breach Investigations Report (DBIR), Verizon Enterprise tracked 1,450 security incidents that exploited the “human factor.” Phishing alone accounted for 82% of those incidents. Reflecting this prevalence, bad actors have launched numerous phishing campaigns in 2018. Provided below are five of the most notable campaigns to occur this year so far…
5 of the Most Notable Phishing Attacks of 2018... So Far | David Bisson
Oh, No! Not Another Security Product
The industry doesn't need more products, companies, or marketing hype. What is needed is an overhaul of the whole approach to security solutions, not an improvement of components. Security should be built on platforms with a plug-and-play infrastructure that better supports customer needs, connecting products in a way that isn't currently possible.
Oh, No, Not Another Security Product| Dark Reading
The most important attributes of a cybersecurity platform
Information security professionals want coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.
We continue seeing ongoing cybersecurity technology trends:
- Enterprise organizations address cybersecurity using disconnected point tools. This strategy is no longer adequate, as it impacts security efficacy and adds operational overhead.
- Security teams address these problems by consolidating and integrating the security tools they use. Many are building security technology architectures a la SOAPA (i.e. security operations and analytics platform architecture).
- Seeing this trend in process, security technology vendors push internal development teams to integrate point tools across their portfolio. They then pitch integrated security "platforms" to customers.