Threat Round-up for Mar 31 – Apr 7

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 31 and April 7. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly […]

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly […]

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly […]

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly […]

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification. Source:: Cisco Security Notice

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification. Source:: Cisco Security Notice