Build a resilient network: What I learned from 5 thought leaders

While you might have mastered enabling a remote-first workplace thanks to the COVID-19 pandemic, keeping the systems, data and applications within your network safe presents another set of challenges.
The ever-evolving threat landscape is seeing cybercriminals and scammers get savvier and more audacious by the minute, in turn, compelling organizations to implement proactive and error-proof network security strategies.
We recently floored our 2024 editorial summit Strategies for a Resilient Network, aimed at helping IT professionals design and manage an agile and secure network infrastructure.
Our speakers provided insights to help guide viewers toward achieving optimal network resiliency.
Kevin Tolly, founder of The Tolly Group, presented how hacker use of AI will impact ransomware attacks.
As traditional defense strategies can fall short in responding to ransomware attacks today, Tolly recommends that organizations explore collaborative architecture.
This architecture involves effort between network security elements and data storage subsystems to detect, block, and mitigate ransomware attacks in real time.
Amritha Arun Babu, a technical product management leader, who has worked for companies like Amazon and Wayfair, tailored her session to product managers.
Arun Babu focused on how PM leaders can empower stakeholders while collaborating cross-organizationally to deliver priority products that meet security needs.
She pointed out the differences between communicating with executives and developers, explaining that executives prefer high-level information to understand business value while developers look for technical details.
PMs should develop skills in communicating to both audiences effectively to avoid roadblocks during product development.
Review more tips from Arun Babu in the full presentation here.
Krishendu De, head of information security at CESC Limited, delved into how organizations can enhance network performance with SASE. De provided an overview of the benefits of SASE, the problems the technology aims to address, SASE use cases and key factors to consider when selecting a provider.
Go to the session for a complete look at SASE. Independent resilience consultant and writer Paul Kirvan guides viewers through integrating sustainability and green technology into a network infrastructure.
In this presentation, Kirvan also addresses environmental impact of network infrastructure, certifications useful when building a resilient network environment and encourages organizations to align network resilience efforts with their broader sustainability goals and initiatives.
Check out the full session for guidance on going green.
The theme of this presentation was that cloud security is everyone's responsibility and he reinforced this message by highlighting these seven cloud misconfiguration remediation strategies: implementing cloud governance, upskilling employees, leveraging cloud security posture management, developing policies and templates, automating security and configuration checks, monitoring, and auditing changes, and implementing technical security controls.
Access the full presentation here for additional insights and to view CSPM product demos.
Prior, Natasha served as the director of audience development at TechTarget.
Natasha also co-leads diversity, equity and inclusion initiatives across the organization.


This Cyber News was published on www.techtarget.com. Publication date: Thu, 09 May 2024 14:43:06 +0000


Cyber News related to Build a resilient network: What I learned from 5 thought leaders

Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
5 months ago Securityzap.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Build a resilient network: What I learned from 5 thought leaders - While you might have mastered enabling a remote-first workplace thanks to the COVID-19 pandemic, keeping the systems, data and applications within your network safe presents another set of challenges. The ever-evolving threat landscape is seeing ...
1 month ago Techtarget.com
Security takes a backseat as CTOs and CIOs lean towards AI in 2024 - 35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to Exclaimer. The survey results show that 2023's biggest challenges for IT ...
6 months ago Helpnetsecurity.com
Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
1 month ago Esecurityplanet.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
6 months ago Securityboulevard.com
Failing Upwards - One of the phrases my early boss in pentesting taught me and adopted was failing upwards in a career. This leads to hard decisions between hanging up part of your subject matter expertise and focusing on managing and leading teams or do you continue ...
5 months ago Blog.zsec.uk
CVE-2021-47363 - In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a ...
1 month ago Tenable.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
6 months ago Helpnetsecurity.com
CVE-2016-2084 - F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 build 685-HF10, 11.5.1 before build 10.104.180, 11.5.2 before 11.5.4 build 0.1.256, 11.6.0 before build 6.204.442, and 12.0.0 before build 1.14.628; BIG-IP ...
8 years ago
CVE-2023-35947 - Gradle is a build tool with a focus on build automation and support for multi-language development. In affected versions when unpacking Tar archives, Gradle did not check that files could be written outside of the unpack location. This could lead to ...
4 months ago
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
4 months ago Cybersecuritynews.com
Securing Tomorrow: A Recap of CISA's Cyber Resilient 911 Symposium - CISA's Emergency Communications Division spearheaded the Cyber Resilient 911 Program's fourth regional symposium, which included CISA Regions 5 and 7. Among the attendees were state 911 administrators, representatives from 911 centers, IT/cyber ...
1 month ago Cisa.gov
Why data, AI, and regulations top the threat list for 2024 - The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare ...
6 months ago Helpnetsecurity.com
Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management Solution to the Cloud - PRESS RELEASE. CHICAGO, Dec. 5, 2023 - Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, today released findings from its ...
7 months ago Darkreading.com
The Next One Billion Lives - Last week, Cisco shared the news that we've achieved our ten-year goal to positively impact one billion lives through the Cisco Foundation, Social Impact grants, and Networking Academy - one year ahead of schedule. As the leaders of these ...
6 months ago Feedpress.me
CVE-2017-7923 - A Password in Configuration File issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 ...
6 years ago
CVE-2017-7921 - An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build ...
6 years ago
Cybersecurity is a Team Sport - Good security hygiene needs to be a fundamental part of company culture, and leadership should make it clear that proper security practices are part of achieving business objectives. Infusing security and operational resilience throughout the ...
7 months ago Darkreading.com
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud - A new report by zero-trust and zero-knowledge cybersecurity software providers Keeper Security has found that over 80% of IT leaders want to move their on-premises Privilege Access Management solution to the Cloud. The findings were outlined in a ...
7 months ago Itsecurityguru.org
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
1 week ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
5 days ago Helpnetsecurity.com
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
5 months ago Esecurityplanet.com
You Don't Know Where Your Secrets Are - Do you know where your secrets are? If not, I can tell you: you are not alone. Hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the certifications, tools, ...
1 year ago Thehackernews.com
Correct bad network behavior to bolster application experience - Legacy hardware-based applications existed happily in isolation, untethered from a network. Today, even the software running from personal hard drives relies on other applications across the network to perform. Many modern apps run off a remote ...
6 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)