Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Black Hat 2018: 12 Executives On The Most Overhyped Cybersecurity Trends Today

CRN asked 12 executives and technical leaders attending Black Hat 2018 what cybersecurity concepts seem to be more about buzzwords than delivering meaningful protection.

Back 1 ... 10   11   12   13   Next
photointernet lock
internet lock Getty Images/iStockphoto

Protecting Infrastructure

Many companies think that firewalls and agents will make them secure, but don’t seem to realize that bad guys aren’t looking to break cables to get into an organization's ecosystem, according to Bhagwat Swaroop, Proofpoint's executive vice president and general manager of email security.

Breaking into an organization's infrastructure is hard, Swaroop said, and often requires a convoluted approach. It's much easier – and more profitable – for bad actors to impersonate an executive and send a credential phishing email, according to Swaroop.

Only 7 percent of security spending is focused around email, Swaroop said, even though it is the vector used for 93 percent of ransomware attacks. The traditional view of putting something in a silo and ensuring through a firewall that only authorized people have access to it is outdated given the pervasiveness of data in the cloud, according to Swaroop.

 
 
Back 1 ... 10   11   12   13   Next

sponsored resources