Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Intel Partner Connect 2021

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1   2   3   ... 13 Next
photo

Compliance Equates To Effective Security

Compliance is necessary but completely insufficient on its own, according to Chris Day, Cyxtera's chief cybersecurity officer. Adversaries are intelligent and adaptive, Day said, and often behave in a creative and pernicious manner toward organizations that aren't doing unstructured hunting.

Penetration testing to satisfy compliance requirements is typically very light, and often just requires running an external scanner, Day said. But by the time organizations achieve compliance, Day said they've often gone through all the money set aside for security.

Organizations should approach security from the standpoint of an adversary and either employ or bring in humans to do comprehensive threat hunting, Day said. A seasoned threat hunter in a network running commands such as PowerShell is going to expose things that simply wouldn't come up in a penetration test, according to Day.

 
 
Back 1   2   3   ... 13 Next

sponsored resources