Recognition & Coverage
Widely Recognized in Cyber Security
We are thought leaders and innovators who are proud to be part of the cyber security community.
CRN 2016 Security 100: 25 Coolest Network Security Vendors
When it comes to a company's security strategy, network security has undergone a major evolution with the advent of next-generation technologies. The inaugural CRN Security 100 list includes network security vendors that offer next-generation firewalls, Internet of Things security, network visibility, cloud security and more. Take a look at 25 of the coolest network security vendors that might benefit from that bump.
In the News
10 Security Predictions For 2018
The legislation seems poorly understood, which will lead to many organizations waiting until the first prosecution is underway before they react, said BeyondTrust security experts. Many US companies are waiting to see how GDPR plays out stateside, and the EU will look to make an example of a multinational that is out of compliance, said Malcolm Harkins, Cylance's chief security and trust officer.
Diversity in Cybersecurity
Why diversity in information security is a far wider topic than gender inequality. Morey J Haber, vice-president of technology at BeyondTrust, believes that “infinite diversity presents infinite views,” which is exactly what the industry needs. “Everyone can contribute regardless of age, culture, religion or sexuality,” he says. “Their views on the world will help us design and build better solutions, better defenses, and help us understand our attacks. Without diversity, we will never understand their logic, position and moral ground.”
Blockchain Consulting: Accenture, Synechron in Pilot Projects
"Our strategy has always been around privileged access management and [applying] what we have learned about delegating privileges correctly on operating systems and applications. And now we can do it to any network device," said Morey Haber, CTO at BeyondTrust.
10 Old-school Security Principles that (Still) Rule
Morey Haber, vice president of technology at BeyondTrust, does offer one old-school caveat. "The recommendation to always stay on the 'latest-previous' version is still sage. The latest security updates may protect you from the vulnerability of the week but can also cause tons of pain, from incompatibility to performance issues. Allow the early adopters to vet out whether a patch or maintenance release is safe and only rush to apply the latest update if the threat is imminent."
Through the Glass, Darkly
The bigger they are, the harder they fall If we think the headlines shocked us with Equifax, SEC, and NSA, we will learn that large organisations have poor cyber security hygiene, are not meeting regulations, and are failing to enforce the policies they developed, recommend and enforce on others. 2018's news will have even more high-profile names and the root causes will be as shocking as the OMB breach.