Over the past decade, we have seen just how destructive cyberattacks have become. It seems every time we turn around, there are new methods surfacing that can often make us question our decisions and actions, and how we can continue to improve. But while we have seen nation-state attacks become more advanced, especially attacks using […]
About Dave Klein
Dave Klein is the Senior Director of Technical Evangelism for Guardicore. With more than 21 years of real-world cybersecurity experience he works with Guardicore teams, customers and industry thought leaders to address the challenges of securing modern hybrid cloud environments. Dave has spoken on a wide variety of cybersecurity topics including micro-segmentation, crytpojacking, hybrid cloud adoption, PCI compliance, stages of the cyber security kill chain, interactions between the physical and cyber worlds as it relates to the radicalization and arming of domestic terrorists, and using cyber forensics in real world criminal cases.
Many security operations teams should eagerly try Centra out for themselves.” ~Dave Shackleton, SANS Analyst
Micro-segmentation is the central IT security best practice response to overly-permissive policies. Learn how to do it right.
Traditional security tools for segmentation are no longer viable. How can enterprises protect their critical assets while keeping their DevOps and Cloud processes intact? Software-defined segmentation is the answer.
Looking forward to 2020, it’s clear that nation state cyber attacks and ransomware are on the rise, and that local governments and healthcare organizations are the most vulnerable. However, the steps to secure your infrastructure might be simpler than you think.
Lacking necessary visibility and internal enforcement capabilities, traditional perimeter security couldn’t distinguish between what was in scope and what wasn’t, so made it impossible for businesses to remain truly compliant. Micro-segmentation using the Zero Trust model provides visibility and allows you to enforce tight controls on data that is in scope, and retain flexibility and visibility over your heterogeneous environment as a whole.
“Never trust, always verify.” But, how can you verify what you can’t see? A strong zero trust model starts with an intuitive and accurate map of your entire data center, updated in real time and with valuable business context and grouping. If you’re thinking about Zero Trust for your enterprise, here’s where it begins.
Hybrid and multi cloud ecosystems need converged, simplified security that works seamlessly and parallels an automated provisioning model. Understanding the shared responsibility model used by cloud providers, as well as how to achieve best in class visibility and control, and the effect of compliance and cloud-native environments can help you make a smart security choice for your unique business context.
Looking at the data center breaches that have the most tangible consequences, huge enterprises like Yahoo, Marriott, and Target have lost billions of dollars and taken a huge hit to their customer trust. Could they have prevented these data center breaches by fixing some simple security vulnerabilities?
Today’s breaches are often headline news, but that doesn’t mean they weren’t preventable. In fact, a few easy changes could strengthen own security posture, harden your data center from within, and stop your enterprise from becoming an easy target for hackers.