CISOโs Practical Guide to XDR: What to Do Now – And When to Add Extended Detection and Response (XDR)
This is a handsโon guide on what to do now – and when to add extended detection and response (XDR).
This is a handsโon guide on what to do now – and when to add extended detection and response (XDR).
We challenge you to look at cybersecurity assessments through a different lens. IT and executive leaders alike should recognize assessments for the sanity check they are, as well as a way to build trust within the organization. Not as some sort of score card or grading system, but as a way to figure out where to start and where to go next.ย
Even if youโre an IT professional feeling a bit skeptical about the boardโs intentions, you can still see that their involvement is a great chance to align security measures with the companyโs broader goals. Itโs all aboutย framing this as a partnership,ย not a critique. One of the best ways to do that is through a cybersecurity assessment that actually makes sense.
Though Zero Trust is here to stay, that doesnโt mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this second part of his blog series he answers the question: what part does business alignment play in cybersecurity implementations?
Palo Alto Networks published vulnerability CVE-2024-3400 that allows unauthenticated command injection (RCE) in the GlobalProtect feature of Palo Alto Networks PAN-OS software. Specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
A Cyber Security Incident Response Team is the emergency room of cybersecurity. You donโt want to need one, but once something bad happens, the ER doctors might just save your life. You donโt want to need critical incident response, but once a cyber incident occurs, youโll be glad you have a team ready.