Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1 ... 5   6   7   8   9   ... 13 Next
photo

Companies Can Keep Out Adversaries By Securing The Perimeter

Companies are still investing a lot of money into trying to build a digital fence around the perimeter of their organization with technologies like firewalls and antivirus software, according to Tina Stewart, Thales' vice president of market strategy. But adversaries are often able to penetrate the perimeter by going after third parties such as contractors and IT partners that already have permission to enter, Stewart said.

Instead, Stewart urged customers to get closer to the asset that adversaries are actually attempting to steal. In particular, Stewart said CISOs should bone up on their knowledge of where sensitive data is stored and how it's used, shared or transferred.

Once that's understood, Stewart said businesses can turn to locking down the sensitive data via encryption and key management regardless of whether it's stored on-premises or in the cloud. Enterprises should have their own access to the cloud as well as the keys, Stewart said.

 
 
Back 1 ... 5   6   7   8   9   ... 13 Next

sponsored resources