Managed Security Services Provider (MSSP) News: 03 June 2020
Today’s MSSP news involves A2V, Acronis, AppOmni, Armor, Cyemptive Technologies, Druva, FireEye, Forrester, Fortress, K2, Mimecast, Pax8 & more.
Top 10 Zero Trust Cybersecurity Companies for 2019
The Top 10 zero trust cybersecurity companies list actually contains 14 businesses & their partner program efforts for MSSPs (managed security services providers).
Let’s Address Cybersecurity’s Gender Disparity
Women in cybersecurity are frequently taught to manage, deflect, and defend against inappropriate behavior. Here’s the smarter path forward.
Managed Security Services Provider Morning News: 11 December 2017
MSSP updates involve Apple HomeKit vulnerability, AWS Single Sign-On, Black Hat, Cyber Insurance, enSilo, Exostar, Forrester, Herjavec Group, OXIAL & more.
U.S. Cloud Providers Face International Privacy Nightmare Amid Court Ruling
A U.S. District Court ruling requires Google to turn over Gmail data stored overseas. Cloud services providers (CSPs) & MSPs must take note.
Enterprise Security Operation Center (SOC) Spending: Smart Investment?
Fully 60% of enterprises are expanding/upgrading their security operations centers (SOCs), Forrester says. Should they hire MSSPs or external SOCs instead?
What Kind of Threat Intelligence Are You Selling Me?
The threat intelligence market is not well defined. Plus, marketing departments are playing buzzword bingo. Forrester Research explains the market.
Black Hat Cybersecurity Conference Buzzword Bingo: Platforms, Ecosystems, More
The Black Hat USA 2017 conference will generate buzzword phrases like “cybersecurity platform” and “ecosystem” and lots more, Forrester Research predicts.
Data Is The Perimeter, Defend It That Way
Data is the perimeter for any network. It is defendable, it can be clearly delineated (with some work mind you) and it can be used as a defense mechanism.
Cybersecurity: Energy Is Embracing Zero Trust, All Industries Should Too
Zero Trust microperimeters are like microgrids — essentially quarantining threats and hacks before they can spread uncontrolled across a network.