Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and malware, security professionals must look for hints of intrusion within the sea of data. Below are four key preventative actions organizations can take to mitigate the impact or avoid a surprise attack on the network: Establish Ground Truth: Understand [ … ]
There is a major shift happening across the technology landscape for both vendors and IT professionals alike, but change in tech is the one thing we can expect. CIOs today must sharpen their cloud literacy and evolve toward more agile and scalable environments, which also means they must prepare to relinquish some control. We must embrace the shifts in order to adapt to employee's needs and market changes. Ten years ago, a savvy CIO when asked, “How much does your datacenter cost?” would smile and respond, “Nothing, it’s included in the rent”. His/her peers [ … ]
Compromised mission-critical systems spell disaster for a company. When disaster strikes, the key to recovery is having a move-forward plan. Are you confident in your company's disaster recovery plan? In desperate times, can you gain access to and restore critical business systems and access essential data? Do your employees know how to proceed? In an uncertain world, disaster recovery is crucial to weathering the storm. No matter how successful a business may be, the unexpected can wreak havoc for companies not prepared for the worst. Natural disasters and technological issues can threaten the security of your [ … ]
In our recent MIDMRKT CIO Forum survey, completed by 212 midmarket IT Executives, Business Process Automation (BPA) ranked 5th highest amongst their priorities, with nearly 20% of executives ranking BPA in their top three. Roughly 40% of executives plan to implement some form of BPA in the next 3-18 months. Two types of process automation that are quickly permeating the market are Digital Process Automation (DPA) and Robotic Process Automation (RPA). DPA and RPA are disparate technologies that serve similar goals, and deployed together can result in a powerful platform that changes business in fundamental ways, [ … ]
It was another insightful and value-filled day at the MIDMRKT CIO Forum. IT executives again attended boardroom sessions to learn more from our vetted and trusted solution providers. The midday keynote featured Justin Fier, Director for Cyber Intelligence and Analysis at Darktrace, and Arthur Braunstein, VP of U.S. Sales at Morphisec, who provided a deep dive into Artificial Intelligence, Machine Learning and Cybersecurity Prevention. During Justin’s time on stage, he discussed the difference between AI and Machine Learning, dispelling the hype and reviewing the threat landscape. Justin asserted that the ultimate objective is for [ … ]