Industry Trends


Healthcare professionals are the epitome of a mobile workforce: constantly on the move and highly dependent on fast, accurate information. They need a secure wireless solution that performs flawlessly on the array of devices they rely on every day. Hospitals, clinics and elder care facilities have countless ways to exploit wireless technology for better patient outcomes and improved operational efficiency. From accessing patient records with computers on wheels or handheld tablets to getting telemetry from medical devices, nurse call systems... [Read More]
by RSS Susan Biddle  |  Nov 17, 2017  |  Filed in: Industry Trends
The majority of these breaches have one thing in common. IT teams are failing to practice basic security hygiene. Cybercriminals target known vulnerabilities because they know that most organizations will have failed to patch or replace their vulnerable devices. WannaCry targeted a vulnerability for which a patch had been available for months. Shame on them. But Petya followed a month later and targeted the exact same vulnerability. And millions of devices were still affected. So, shame on us. [Read More]
by RSS John Maddison  |  Nov 15, 2017  |  Filed in: Industry Trends
The cybercriminal marketplace is adept at adopting the latest advances in areas such as artificial intelligence to create more effective attacks. We anticipate this trend to accelerate into 2018, enabling the destructive trends mentioned in this blog. [Read More]
by RSS Derek Manky  |  Nov 14, 2017  |  Filed in: Business and Technology, Industry Trends, Security Research
The holiday shopping season is also a big event for cybercriminals. Fake web sites, intercepting your financial data, charity scams, email phishing attacks, fake shopping sites, texting and SMS scams, and more are all designed to steal you personal and financial information. So, in addition to checking your credit card balances and making out your shopping lists, you also need to take precautions before doing your holiday shopping online. If done right, it can be a safe and convenient way to buy gifts – if you follow a few simple rules. [Read More]
by RSS Anthony Giandomenico  |  Nov 13, 2017  |  Filed in: Industry Trends
In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s... [Read More]
by RSS Phil Quade  |  Nov 09, 2017  |  Filed in: Industry Trends
The growing need for on-demand network and compute resources is outpacing available internal resources, even in private cloud environments, and is driving organizations to the public cloud. According to IDC, 75% of organizations are currently implementing or considering the implementation of public cloud resources, and they predict that 50% of enterprise workloads will migrate to the public cloud by 2018.  This new shared infrastructure approach comes with significant security challenges, including creating and maintaining a consistent... [Read More]
by RSS John Maddison  |  Nov 08, 2017  |  Filed in: Industry Trends
The growing complexity of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security wiring closet. Billions have been spent on this approach every year for decades, and we really don’t have much to show for it. If cybersecurity is an arms race, the good guys aren’t winning. Instead, security... [Read More]
by RSS Aamir Lakhani  |  Nov 06, 2017  |  Filed in: Industry Trends
It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning them of another breach or risk of compromise. There are so many security events happening day in and day out that it’s difficult to decide what’s the top priority. That’s a good metaphor for the state of cybersecurity efforts across the globe – we’re in a constant state of flashing red. That is, if we even see the attack coming, which we increasingly don’t. Recent breach disclosures, once again, show that... [Read More]
by RSS Aamir Lakhani  |  Nov 06, 2017  |  Filed in: Industry Trends
With industry-specific compliance requirements driving security spending and deployment, it’s natural to assume that best practices for securing access to sensitive data are different from vertical to vertical. However, that assumption may be changing.  [Read More]
by RSS Bill Hogan  |  Nov 03, 2017  |  Filed in: Industry Trends
On October 16th, the U.S. Department of Homeland Security (DHS) announced its intention to have all federal agencies revamp their email security protocol. The Binding Operational Directive (BOD-18-01) will require all federal agencies to deploy STARTTLS, Secure Policy Framework (SPF), Domain Keys Identified Mail (DKIM), and Domain-based Message Authentication Reporting and Conformance (DMARC) within three months of the directive’s announcement. While having these email security features enabled is generally considered to be a cybersecurity... [Read More]
by RSS Felipe Fernandez  |  Oct 30, 2017  |  Filed in: Industry Trends