Cisco survey reveals that device sharing between working parents and children is normal practice, despite security risks.
Enterprise Environments, Exposed Endpoints, and the Best Practices for Threat Hunting
In his latest piece, Tamer Odeh, Regional Director at SentinelOne in the Middle East discusses the challenges faced by today’s security teams and best practices for threat hunting.
Comprehensive asset management is the prerequisite of effective security
Now that multi-cloud and hybrid workplaces are adding multiple layers of complexity to technology stacks, security teams can be overwhelmed with alerts. By thoroughly profiling every element of the network and applying some basic automation, threat hunters can compile a more manageable to-do list – one that ensures clarity and purpose. Some items may be quick wins, such as simple software patching or reconfiguration. Others may be more complex but require immediate action because of the potential harm they could cause. And others may be trivial and can be ignored.