Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Intel Partner Connect 2021

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1 ... 5   6   7   8   9   ... 13 Next

Companies Can Keep Out Adversaries By Securing The Perimeter

Companies are still investing a lot of money into trying to build a digital fence around the perimeter of their organization with technologies like firewalls and antivirus software, according to Tina Stewart, Thales' vice president of market strategy. But adversaries are often able to penetrate the perimeter by going after third parties such as contractors and IT partners that already have permission to enter, Stewart said.

Instead, Stewart urged customers to get closer to the asset that adversaries are actually attempting to steal. In particular, Stewart said CISOs should bone up on their knowledge of where sensitive data is stored and how it's used, shared or transferred.

Once that's understood, Stewart said businesses can turn to locking down the sensitive data via encryption and key management regardless of whether it's stored on-premises or in the cloud. Enterprises should have their own access to the cloud as well as the keys, Stewart said.

Back 1 ... 5   6   7   8   9   ... 13 Next

sponsored resources