The Three Stages Of Security Hygiene: Evaluation

In the first installment of our three-part series, Tanium CSO David Damato explores why good security hygiene is so essential, and details the first stage to getting your IT organization in order.   Are you guilty of poor security hygiene? If so, take heart. You’re not alone. IT and security teams have long neglected basic...

Broken Cyber Hygiene: A Case Study

With more than 200 different products from 125 vendors to solve the top 20 security controls (deep breath), there’s no shortage of information security tools in the market. Organizations are building defensive arsenals with these tools, but the intruders are still slipping through the digital “doors and windows” left open and unlocked by the organization....

The UK Needs Actions, Not Words, to Encourage Basic Cyber Hygiene

The UK’s newly appointed Minister for the Digital Industries Matt Hancock gave his first speech on cybersecurity last month. Hancock is tasked with managing government policy towards the fast growing digital and creative sectors, ensuring they continue to thrive. Speaking to an audience of businesses he acknowledged that the “vast majority of cyber attacks exploit...

What does Cybersecurity Awareness Mean to You?

At Tanium, awareness is the foundation of what we do: being aware of your entire network, and what’s happening on it, is the first step in building an IT security strategy fit for today’s threat environment. You could say awareness is the first component of cyber hygiene: after you know what’s on your network, you...

US Chamber of Commerce Panel Recap: Three Keys to Better Cybersecurity

Credit: Vincent Voci The cybersecurity world faces a unique conundrum. On one hand, cybersecurity is becoming ever more present in our daily lives. Rarely does a week go by when we don’t hear that a major business or government agency has been breached. Today, it’s no longer a matter of if, but when, a breach...

Five Ways the Health Care Industry can Improve its Cyberhealth with Better Hygiene

The health care industry has had a remarkably tough couple of years when it comes to security. Hacks of hospitals and health plans are now occurring almost daily, according to the U.S. Department of Health and Human Service’s online database. Over 100 million patient records were reportedly breached in 2015 — equivalent to a third...

The 5 Questions You Must Answer for Good Security Hygiene

We all know IT professionals move too frequently between fires. The demands of overly complex infrastructure, continual threats, and time-strapped IT Security teams mean leaders must go to where the smoke is, only occasionally stopping to ask themselves “Am I making any progress?” To begin to answer this question, you must start with another question…five...

Compliance doesn’t have to be a risky business: Introducing Tanium Comply

Today we’re announcing the latest Tanium product module, Tanium ComplyTM. Enabled by Tanium’s unmatched speed at scale, Comply transforms the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints you have. Compliance is likely to rank high on any CIO’s...

Is Business as Usual Possible in the Cloud?

I am privileged to have been part of two massive IT transformations in my career. At VMware, I partnered with enterprises as they embarked upon a once-in-a-generation transformation to virtual machines and then to the private cloud. I was personally involved in launching the VMware vCloud Director private cloud platform and saw some of the...

Going Back to Basics to Prevent Ransomware Attacks

Ransomware attacks are now daily news as new malware families emerge with nearly the same frequency and enterprises increasingly become the targets. In fact, ransomware has become so pervasive the US and Canada this month issued a joint cyber alert warning about the recent surge in attacks. Ransomware typically enters a network as a seemingly...