Just in time for the new year, Morphisec has released a new version of our Endpoint Threat Prevention platform. Version 3.0 features enhanced, advanced analytics and SOC dashboarding, richer, SOC-enabled threat intelligence capabilities, and a new pre-installation application adware sanitizer module. It also features extended threat protection across multiple threat categories, including Mimikatz, as well as strengthened audit controls.
Morphisec is pleased to announce the 2018 winners of the Morphisec Women in Cybersecurity Scholarship. The program offers three scholarships for female students enrolled in cybersecurity-related studies to support and encourage young women exploring a career in this field. In addition to the cash awards, the first place winner receives a personal mentoring session.
One of the hottest topics at last week’s RSA Conference was GDPR. Over twenty sessions covered GDPR from various angles and many more touched upon the subject in some way. This was hardly surprising – with the May 25th compliance deadline looming, companies are frantically trying to understand the implications, their responsibilities and actions they need to take.
Although I’m excited to be at the RSA Conference with my Morphisec colleagues, it reminds me of the impetus for starting our Women in Cybersecurity Scholarship. Of 28 keynote speakers at RSAC, only seven are women, and six of these were added at the last minute following a string of scathing tweets and articles. This 25% figure seems to be the average percentage in the general sessions as well. I attended several that were one woman in a panel of four, a few that had only male speakers and a single session that had a majority female panel. If I had to guess the overall attendee and exhibitor gender split I’d say it fell along the same lines, but that percent is skewed by the number of women simply scanning badges.
Much has been written about the high barriers to entry for women in cybersecurity. Certainly the numbers are depressing. Women make up just 11% of the world’s information security workforce, according to the 2017 Global Information Security Workforce Study. This is far behind other industries.
For example, in the U.S. women represent nearly 47% of total workers and 51.5 % of management and professional positions. They account for 60% of pharmacists and 34% of doctors. Even the IT and computing industry, notorious for low female participation, puts cybersecurity to shame with 26% of positions held by women.
This is the second blog post in a series of excerpts from the ebook (download here) “Know Your Cyber Security ROI: Making the Business Case for Cyber Security.” The first post introduced the concept of cybersecurity implicit ROI and the factors that determine the expected value of your cybersecurity operations. It also outlined the three attack phases and the correlation between attack phase and organizational cost.
This post examines the first attack phase and the costs associated with precautionary measures during this phase:
Organizations employ many precautions and actions in the attempt to block cyber attacks. Such measures can require significant time and resources to implement as well as maintain. This class of tools includes endpoint security solutions such as anti-virus, protection and detection systems as well as gateway solutions.
Every enterprise includes software patching as part of its security system to some extent. Because of its widespread use and marked impact on business processes, we will examine patching as an example of direct and indirect costs to your organization.
Microsoft recently announced it would extend support for its Enhanced Mitigation Experience Toolkit (EMET) until July 31, 2018. According to Microsoft, this 18 month reprieve – originally support was scheduled to end on January 21, 2017 – is the direct result of customer feedback.
Executives often view cybersecurity as an expense, a necessary one perhaps, but still a burden on company finances, focus and time. Instead it should be approached as an investment – an investment in protecting an organization’s systems, resources, customers and reputation. And, like any investment, cybersecurity should be able to prove its value by delivering a solid ROI. But how do you calculate cybersecurity ROI? After all, security doesn’t create earnings.
Microsoft released its October patching update today and, as announced, it introduces a major change that has many system administrators wondering just what to do.
A Brief History
Virtual Desktop Infrastructure (VDI) is not a new concept – in fact virtualized desktops can be traced back to the 1960s, when IBM divided up mainframes into virtual machines to allow for multiple, simultaneous users. The modern take on VDI emerged around 2007 with the Virtual Desktop Manager by VMware. Citrix entered the game in late 2008. Over the next years, VDI and grew steadily but slowly. Until recently. The emergence of cloud-hosted virtual desktop solutions has accelerated VDI adoption by enterprises and smaller organizations alike.