Cabling for Wi-Fi
The latest design standard for Wi-Fi requires an intelligent approach to cabling in order to derive full benefit, according to Valerie Maguire at Siemon | |
Security from the cloud
Danielle Russell at AT&T Cybersecurity offers three important principles to consider for effective cloud security |
|
Securing visibility
Andrew Bushby at Fidelis Cybersecurity says that a streamlined security stack can provide a more complete picture |
|
Cyber backup
Ezat Dayeh at Cohesity makes the case for data backup in security management
|
|
I have data...
Peter Barker at Rufus Leonard explains how you can unleash the power of your data using cloud insight technologies
|
|
Model behaviour
Saryu Nayyar at Gurucul thinks that a different approach to security is required to combat the insider threat
|
|
|
|
|
Comment
Welcome to the October 2019 Newsletter.
We’ve a stack of security features for you this month – quite literally so in the case of the opinion piece from Andrew Bushby, UK director at Fidelis Cybersecurity. Here Andrew explains how a streamlined security stack can deliver complete visibility of an organisation’s distributed and ever-growing cyber terrain. Then we have Danielle Russell, lead product manager at AT&T Cybersecurity, providing us with three essential principles for effectively securing the cloud. With organisations increasingly adopting cloud infrastructures it’s vital that their security procedures adapt accordingly. Read Danielle’s article for more.
Next, Ezat Dayeh, Senior Engineering Manager at Cohesity, reminds us of the importance of data backup in security – especially when it comes to combatting ransomware. As Ezat explains, “With data being so fundamental to an organisation's operational life, backing up shouldn't be neglected or put off due to costs. Backups are the only way to recover following a ransomware attack, and they must have the highest standards of data protection applied so that they can provide assured recovery for the organisation.”
Finally Saryu Nayyar, CEO of Gurucul, examines the growing risk posed by insider threat behaviour. How do we secure against an unknown threat, one that’s as likely to occur through basic human error as it is malicious intent? Read Saryu’s article to discover how User and Entity Behaviour Analytics (UEBA) can help.
Follow us :
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
|
|