AppGuard Blog

Enterprise

Posted on Nov 8, 2018

Panelists worthy of any CISO’s attention, discussed and prioritized the methods China is using to compromise enterprises via their supply chain, including the currently rare, covert placement of spy chips into computing hardware. China’s ‘2025’ strategy to steal and degrade western economic power affects any enterprise that generates high-margin value and/or is in the same […]

Read More ›

Posted on Oct 29, 2018

Reports of covertly adding chips to motherboards for industrial espionage require CISO’s to ask their peers and teams ‘what are the Chinese actually doing to steal data from organizations like ours’ and ‘what should we be doing to counter their efforts’? Enterprises targeted by China can get the answers and insights they seek from the […]

Read More ›

Posted on Oct 16, 2018

5 Critical Areas All CISOs Should be Focused On – CISO Web Panel: 3 October 2018 Panelists Donald J. Welch, Penn State, CISO Anthony Cruz, Federal Energy Regulatory Commission, Cyber Thought Leader Moderator: Neal Conlon, AppGuard Inc, VP Business Development The CISO panel explored the challenges of 2018 and what remedies and priorities they consider […]

Read More ›

Posted on Sep 26, 2018

AppGuard is facilitating a virtual panel discussion of CISOs on October 3rd to help them help each other better prepare for 2019. Attendees can expect to gain useful insights from peers and join the conversation. Five topics loosely tied to mitigating malware threats will be explored. 1. Evaluate current tools to determine what is and […]

Read More ›

Posted on Sep 25, 2018

AppGuard continues to build momentum globally as an industry leader in responding to the needs of partners and clients with a suite of new products and features on the roadmap. We are sharing a sneak peak: AppGuard Version 6.1 Enhancements Release Date – October 2018 AppGuard Agent and AppGuard Managed Services V6.1 are receiving anticipated […]

Read More ›

Posted on Sep 12, 2018

Google recently stated that none of its 80,000 employee accounts using their Titan Security Key has been compromised since deployment. This is because this hardware authentication device is a possession factor that cyber criminals cannot electronically steal as they do passwords. But, as great as this and like tools are, they are susceptible when the […]

Read More ›

Posted on Aug 29, 2018

About a year ago I took on the role of CEO of one of the hottest emerging cybersecurity companies in the world. We were already embedded in critical infrastructure, large enterprises and organizations around the globe. About 2 minutes after my 79 year old mom told me how proud she was, she said “What about […]

Read More ›

Posted on Aug 27, 2018

There’s a pervasive, false perception in contemporary politics. The candidate that advocates spending the most on something cares most about solving the problem. Today’s endpoint protection suites are similarly ranked. Those with the longer list of features are ranked higher. Similarly, like features are seldom compared one-to-one but are presumed little different among different suites. […]

Read More ›

Posted on Aug 15, 2018

One of today’s most widespread cybersecurity principles seems prudent on the surface but has made the enterprise cyber program a bloated, lumbering beast of burden. Defense in depth is simple to intuit; it is as obvious as two heads are better than one. Reality demands, however, that the enterprise optimize. How many are too many? […]

Read More ›

Posted on Aug 7, 2018

If ever in a freezing cold room with IT/Sec-Ops people, raising the topic of patch management can heat it up fast. Patching applications on an organization’s client and server endpoints is far more challenging than most people realize. The uncertainty over what applications need to be patched in the next cycle makes it seem a […]

Read More ›

Topics

Subscribe

Subscribe to our blog to receive email notifications when new posts are added!