News Type: Article

Cybersecurity industry faces ongoing talent shortage

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements. Learn more about our Expert Insights Report on Help Net Security.

Cyberattacks Against Sporting Events are Growing More Calculated

Cyberattacks are turning sporting events into high-stakes targets—affecting organizations, athletes, and fans alike. From the FIFA World Cup to the Super Bowl, threats are escalating. Learn how the game is changing and how to stay ahead in this article by Jim Broome. Read more on Security Boulevard.

MSSP Alert Live 2024 Kicks Off: Key Themes and Sessions

MSSP Alert Live 2024 begins tonight in Austin, Texas, with a welcome reception at Zilker Terrace. Over the next two days, industry leaders will share real-world insights on the evolving MSSP landscape. Charly Bun, Senior Director of Managed Services at DirectDefense, will present strategies for MSSPs to navigate customer expectations, technology changes, and pricing challenges.… Read more »

Evolve or Die: Customers Expect More From Their MSSPs

MSSPs now serve both large enterprises and smaller businesses, facing rising customer expectations amid rapid industry growth. Charly Bun, Senior Director at DirectDefense, will address how MSSPs can refine strategies to adapt at MSSP Alert Live, October 14-16, 2024, in Austin, Texas. Learn more about what his session will cover on Channel E2E.

Beating MFA Fatigue and AI-Driven Attacks with DirectDefense

Threat actors increasingly target multi-factor authentication (MFA) using advanced techniques like MFA fatigue, SIM swapping, and generative AI to enhance phishing. Jim Broome stresses the need for organizations to audit MFA solutions regularly, addressing process and technology vulnerabilities to stay ahead of these evolving threats. Watch the interview on CISO Series.

How network segmentation can strengthen visibility in OT networks

A firewall serves as a key defensive mechanism for OT networks, monitoring, blocking, and alerting against threats while enabling necessary data flow. However, encrypted traffic often bypasses its inspection capabilities, revealing its limitations. This is why firewalls alone are insufficient and not the best defense for protecting critical OT environments. Learn the role of network… Read more »

Combat Cyber Anxiety with our Expert Insights Report

X