"ESG" Posts

Ransomware Attacks Are Still Widespread — Fueled By Cyber Insurance

As the ransomware industry grows, so does the cyber insurance industry. Enterprise Strategy Group takes a closer look at the disturbing trends.

Security Operations Centers: One User Interface for SOC Analysts?

What’s the latest chapter in SOAPA (security operations and analytics platform architecture)? The answer involves a common UI/UX for SOC analysts.

Cloud Service Providers: Emerging As MSSPs?

Microsoft Azure Sentinel, a cloud-based SIEM platform, shows how cloud services providers (CSPs) are emerging as MSSPs, ESG explains.

Enterprises Need to Embrace Top-Down Cybersecurity Management

Top-down cybersecurity protects the business mission, objectives, and processes and then aligns those priorities with the right controls and monitoring down the technology stack.

Cyber Risk Management: A Disconnect Between Business and Security

Business leaders want actuarial tables & timely metrics to adjust risk management strategies in real time. Alas, most CISOs & chief risk officers don’t have the processes or metrics to satisfy those needs.

Cyber Risk Management Grows More Difficult

Why do 73% of cybersecurity, GRC, and IT professionals believe cyber risk management is more problematic? ESG’s Jon Oltsik explains.

6 Requirements for Cybersecurity Platforms

A cybersecurity technology platform must go beyond tightly-coupled product integration and include the following six capabilities, ESG Global says.

Machine Learning: Security Product or Feature?

Do machine learning-based security tools constitute a new type of product, or will machine learning technology simply turn into a product feature built into existing security technologies? ESG offers analysis.

Where Endpoint Management and Security Meet

Corporate IT must explore modern management approaches that can potentially help consolidate investments, improve the overall security, and perhaps achieve a seamless end-user experience. ESG explains why.

Software-defined Perimeter (SDP): Important Initiative, Ineffective Name

No one has a software-defined perimeter (SDP) budget, but everyone has an SDP requirement. It’s time to abandon the techno-speak and reframe SDP as ubiquitous secure access services (USAS).