Dan Bowden: Automated Forensics Boost a Security Team’s Effectiveness
Security professionals can answer tougher, more complex security questions in less time using next-generation endpoint security tools based in the cloud. When colleagues understand the need for security, they are more likely to want to do their part to protect the...
Brian Timmeny: Endpoints Must Be Protected at Several Levels
It’s important to protect not just an endpoint but also the surrounding environment that protects that endpoint. Effectively using AI and machine learning will be key to keeping up with the increasing volume and complexity of attacks. “Whenever someone tries to access...
Brent Maher: Endpoint Security Decisions Require a Strategic Approach
Mature security organizations refer to a security framework or maturity model when deciding whether to adjust their endpoint-security strategy. It’s important to be certain that the endpoint-security solution you purchase can actually solve the problems you have...
Alina Sarvey: Data Shows the Need for Better Endpoint Security
How a business views security’s importance can often play a role in the decisions made about improving endpoint security. Baseline security reports can help security professionals and the business decide whether there is a need for increased endpoint security. “The...
Carbon Black: 32 Security Experts on Changing Endpoint Security
The book includes insights from the following experts: Alina Sarvey, Endpoint Security Engineer, Leidos, Data Shows the Need for Better Endpoint Security>> Brent Maher, Senior Vice President – Chief Information Security Officer, Johnson...
Bobby Adams: A Holistic, Enterprise-Wide Strategy is Essential
Many scanning tools provide information about the severity of vulnerabilities. This needs to be part of your aggregated threat intelligence. Continuous scanning is an important part of any vulnerability management program for both vulnerability detection and...
Juan Morales: Focus First on Assets That Keep The Business Running
A dialog with business stakeholders is important because vulnerability-management systems don’t understand the context of how assets are being used. Solutions that have a prioritization model and support business criticality of assets is needed. By getting business...
Pieter Vanlperen: Risk Assessment and Prioritization is a Triage Process
In order to use vulnerability scans effectively in a risk-management strategy, you need to be able to triage and analyze risk, and there aren’t tools that can do that effectively today alone. Doing that requires systems and people. New AI systems based on machine...
Nick Green: In a Large Organization, Know the Risk Owners and Adapt to Their Needs
Before meaningful vulnerable management is possible, you must know what you are protecting. This means building an asset inventory that includes asset owners. If a business group does not agree with the security team’s risk rank and prioritization, it should be able...
John Trujillo: You Must Understand the Business Function of Digital Assets
To have effective risk management, there need to be standards around how risks are identified, how they’re ranked, and how they are either accepted or remediated. As you move to more automated, AI-driven tools for vulnerability scanning and analysis, you need to have...