Looking at the data center breaches that have the most tangible consequences, huge enterprises like Yahoo, Marriott, and Target have lost billions of dollars and taken a huge hit to their customer trust. Could they have prevented these data center breaches by fixing some simple security vulnerabilities?
About Dave Klein
Dave Klein is the Senior Director of Technical Evangelism for Guardicore. With more than 21 years of real-world cybersecurity experience he works with Guardicore teams, customers and industry thought leaders to address the challenges of securing modern hybrid cloud environments. Dave has spoken on a wide variety of cybersecurity topics including micro-segmentation, crytpojacking, hybrid cloud adoption, PCI compliance, stages of the cyber security kill chain, interactions between the physical and cyber worlds as it relates to the radicalization and arming of domestic terrorists, and using cyber forensics in real world criminal cases.
Entries by Dave Klein
Today’s breaches are often headline news, but that doesn’t mean they weren’t preventable. In fact, a few easy changes could strengthen own security posture, harden your data center from within, and stop your enterprise from becoming an easy target for hackers.
Cloud vulnerabilities, spear phishing, Layer 7 DDoS attacks, fileless malware and more. Learning from the growing cyber threats and attack trends to look out for in 2019 can help you improve your security posture for the year ahead.
The consequences of non-compliance with regulations such as PCI-DSS and HIPAA are increasingly serious, while achieving compliance is only becoming more difficult because of dynamic workloads and hybrid IT environments. How can micro-segmentation make compliance easy again?
Any business that works with payment data recognizes the challenges involved with sustainable compliance. PCI regulations change as the industry learns more about security and as wider threats evolve. Learn how you can bring your organization on board for sustainable compliance, using the right security tools and correctly managing an ongoing project.
The movement of data and workloads to the cloud has been more like a headlong rush. In the quest for a competitive edge, businesses are clearly eager to take advantage of the agility and elasticity the cloud affords them – so much so that security is often an afterthought.
Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.
When the Equifax breach was announced on September 7th, I was not surprised. When I heard the magnitude of the damage: 143 million US consumers and 44 million British consumers – which equate to roughly 57% and 97% respectively of both country’s populations, age 18 years of age and older – I, again, was not […]
From the horrors of ransomware, panic over election hacking, stolen emails to very interesting things like WannaCry andPetya/NotPetya/Nyetya/Goldeneye, it’s been a red-letter year in the world of cybersecurity. At Black Hat 2016 we introduced the Infection Monkey, free, open source pen test tool to educate the world on lateral movement. Lateral movement is how hackers […]