The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new
The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from
Attack simulations continuously mimic real-world threats to highlight gaps in security systems, and unlike traditional ad hoc testing, they provide an ongoing view of dynamic security environments. Can the insights from attack simulations be used to close gaps and strengthen security programs? They can, if integrated into your existing security operations.
In this paper, you ll learn:
Why continuous attack simulations are more effective than traditional, ad hoc testing
Which common security weaknesses can be identified through attack simulations
How to integrate attack simulations into your overall security operations
Joe Partlow, CTO, ReliaQuest Not only have enterprises accelerated their shift to the cloud in 2020, but they have also leapfrogged into multi-cloud environments. With this transition comes the top challenge: Maintaining appropriate visibility. Joe Partlow, CTO of ReliaQuest discusses how to tackle this challenge. p>In this video interview with Information Security Media Group, Partlow discusses:
Why visibility is such a persistent challenge;
How the issue can be addressed up front in configuration;
Ways to increase visibility across cloud and on-premise environments for more efficient detection and response. Partlow, ReliaQuest CTO, currently oversees all new research and development efforts and new product initiatives. He has been involved with Infosec in some capacity or role for over 20 years, mostly on the defensive side but always impressed by offensive tactics. Current projects and interests include data analytics at scale, forensics, threat, security metrics and a