Security Archives | TechSpective
a unique perspective on technology
Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights
Tony Bradley | | Blog, endpoint detection and response, Endpoint Protection, Incident Response, security posture, sophos, Sophos X-Ops
The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to ...
Guarding Your Business: A Guide to Employee Training for Cybersecurity Vigilance
Ainsley Lawrence | | Blog, Cybersecurity, cyberthreats, data protection, Identity Theft, Malware, Phishing, Ransomware
Protecting your business from scams and cybersecurity threats not only bolsters your business’s practices but also maintains your client’s trust. Without these safeguards, your business could fall victim to irreversible issues like ...
Data Security Posture Management Should Focus on Securing the Data
Organizations use and store many types of data. Some of it is high value containing business-critical information or regulated data, such as PII (personally identifiable information). Other data is less sensitive and ...
HP’s Threat Report – New Threats, Bigger Problems
HP issues a threat report quarterly (this month’s came with a video), and this quarter’s report suggests that things are getting worse with regard to attacks and related monetary damage. While this ...
The Strategic Partnership Elevating API and Endpoint Security
Salt Security has announced a pivotal partnership with CrowdStrike. This collaboration marks a significant milestone for businesses seeking robust, integrated security solutions that cover both endpoints and the increasingly critical API layer ...
Simplifying Cybersecurity from Confusion to Clarity
Cybersecurity is a dynamic and fast-paced industry. Staying ahead of threats requires constant innovation and a keen understanding of the landscape’s evolving challenges. I recently spoke with Ric Smith, Chief Product and ...
Strategic Decision-Making: Balancing Budgets and Security
TechSpective Podcast Episode 124 Cybersecurity is cyclical. Over the past two decades that I have been working in and writing about security, the market has gone from an array of point ...
The Vendor of My Cloud-Vendor is My Friend
What does a suburban roofing company have in common with a cloud supplier? The answer can be found in the passage of time. This conversation occurred with Sean Heide, research technical director ...
The Vital Role of SBOMs and the Pioneering Solutions of Tanium
The concept of protecting from risks originating from the Software Supply Chain (SSC) has emerged as a cornerstone for robust digital defense in an era with growing software supply chain attacks. A ...
Keep Time on Your Side – What We Need to Understand about Ransomware Attacks
Ransomware has dominated the security conversation in recent years. But even so, many people and organizations still don’t understand how these attacks unfold, despite their efforts to protect their respective attack surfaces ...