CyberArk’s new Cloud Entitlements Manager is designed to help organisations rationalise and remediate excessive or unwanted privileges.
Fran comments on interesting news and her ideas about IT security.
Identity management technologies are undergoing considerable transformation to make them fit for purpose for the modern era.
Red teaming exercises help organisations to improve their security posture by using adversarial techniques to pinpoint weaknesses.
The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
Once, managed security services were somewhat limited in nature, managing such tools on behalf of customers. MDR services shift that paradigm.
Estimates from ISC2 indicate that the shortfall of skilled and experienced security professionals could be as high as four million worldwide.
In the latest of Fran Howarth's blogs on managed detection and response services, she looks at telemetry, which she feels is a vital ingredient to MDR.
EDR technologies go further than traditional endpoint security controls to enable organisations to move from a reactive to a proactive security stance.
At the core of MDR services is endpoint security. Taken at its broadest definition, an endpoint in computing terms is the entry point to a service.
This is the first in a series of posts on the managed detection and response (MDR) service market, including the capabilities that are on offer.