Two KPIs Essential For Measuring Security Tools

Posted by Arthur Braunstein on Oct 19, 2017 8:38:03 PM

 

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation.

First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more intrusive it is and the more effort it takes to manage it. The complexity and pain of managing – not buying, managing! – security tools often forces companies to reconcile themselves to unacceptable exposure, for example to security-related business disruption, for want of resources to manage cumbersome defensive technology.

Read More

Topics: Moving Target Defense, Endpoint Security, CISO, Cyber Security

Case Study: Securing Advanced Manufacturing From Advanced Threats

Posted by Morphisec Team on Aug 31, 2017 9:41:20 PM

 

Modern manufacturing technology brings improved quality and efficiency at lower costs. It also brings greatly increased cyber risk. Deloitte and MAPI’s (Manufacturers Alliance for Productivity and Innovation) recently published a report which takes a hard look at the effect of current manufacturing trends on cyber risk. The study found that, while manufacturers are beginning to prioritize cybersecurity, they have a long way to go. Read the report, “Cyber Risk in Advanced Manufacturing,” to see their findings and recommendations to be “secure, vigilant and resilient.”

Read More

Topics: Endpoint Security, CISO, Cyber Security, Case Study

Hedge Funds Need to Hedge Against Hackers

Posted by Omri Dotan on Feb 1, 2017 9:55:46 AM

Hedge funds are coming under increasingly heavy fire from attackers and regulators alike. A 2015 report issued by the SEC that examined more than 100 financial companies found that 88 per cent of broker-dealers and 74 per cent of investment advisers have experienced a cyberattack directly or through one or more of their vendors.

Read More

Topics: Endpoint Security, CISO, Cyber Security

How to Build an Economically-Driven Cyber Defense Strategy

Posted by Ronen Yehoshua on Jan 27, 2017 1:07:55 AM

Today, a few hackers may be ideologically motivated, but the majority of attacks are financially-driven crimes. This is seen most clearly in the rise of ransomware; no mystery, just pure and simple extortion. And consider the latest victim of choice, the healthcare industry, sacrosanct in most people’s eyes but merely a lucrative, vulnerable target to cybercriminals. As such, cybercrime follows the economic rules of any business – reward must outweigh costs – and should be confronted on those terms.

Read More

Topics: Cyber Attacks, Endpoint Security, CISO, Cyber Security

Calculating the Costs of Patching

Posted by Netta Schmeidler on Dec 4, 2016 2:12:02 PM

 

This is the second blog post in a series of excerpts from the ebook (download here) “Know Your Cyber Security ROI: Making the Business Case for Cyber Security.” The first post introduced the concept of cybersecurity implicit ROI and the factors that determine the expected value of your cybersecurity operations. It also outlined the three attack phases and the correlation between attack phase and organizational cost.

This post examines the first attack phase and the costs associated with precautionary measures during this phase:

Organizations employ many precautions and actions in the attempt to block cyber attacks. Such measures can require significant time and resources to implement as well as maintain. This class of tools includes endpoint security solutions such as anti-virus, protection and detection systems as well as gateway solutions.

Every enterprise includes software patching as part of its security system to some extent. Because of its widespread use and marked impact on business processes, we will examine patching as an example of direct and indirect costs to your organization.

Read More

Topics: Endpoint Security, CISO, Cyber Security

Calculating Your Cyber ROI

Posted by Netta Schmeidler on Nov 16, 2016 6:00:01 AM

 

Executives often view cybersecurity as an expense, a necessary one perhaps, but still a burden on company finances, focus and time. Instead it should be approached as an investment – an investment in protecting an organization’s systems, resources, customers and reputation. And, like any investment, cybersecurity should be able to prove its value by delivering a solid ROI. But how do you calculate cybersecurity ROI? After all, security doesn’t create earnings.

Read More

Topics: Cyber Attacks, Endpoint Security, CISO, Cyber Security

How to Stack the Deck Against Attackers. Gartner Security Summit Recap.

Posted by Ronen Yehoshua on Jun 23, 2016 12:26:53 PM

Last week’s Gartner Security & Risk Management Summit crammed several months’ worth of information, analyses, workshops and networking into 3 ½ short days.  As expected, everything related to cyber security was particularly hot. Though many messages were familiar, a shift could be detected, a recognition that the landscape is transforming and innovation is called for.

Read More

Topics: Events, Endpoint Security, CISO, SecOps

Check out our Attack Analyses!

Take a deep dive into technical analyses of attacks prevented by Morphisec.

Subscribe to our Blog

Happy to keep you in the loop with industry insight, cyber security trends,  and cyber attack information and company updates.

Morphisec Named a Cool Vendor 2016

Morphisec is a Gartner Cool Vendor 2016

Each year Gartner identifies new Cool Vendors it considers innovative or transformative. Morphisec is honored be to named a Cool Vendor 2016. Here's more....

 

Recent Posts

Most Popular Posts