Archives for 


Prevention And Blocking Are Not Cutting It So A New Path For Endpoint Security Is Needed – Chuck Leaver

Written By Josh Harriman And Presented By Chuck Leaver Ziften CEO   Traditional endpoint security software, some of which have been around for over twenty years, rely heavily on the same protection approaches every year. Although there is always innovation and strides to enhance, the underlying problem still exists. Dangers will always find a path […] Continue reading →

Get Your Gartner SOC Nuclear Triad By Putting Your Trust In Ziften – Chuck Leaver

Written By Dr Al Hartmann And Presented By Chuck Leaver Ziften CEO   Anton Chuvakin, VP and security analyst at Gartner Research posted about the 3 essential Security Operations Center (SOC) tools needed to supply efficient cyber attack visibility. Chuvakin compared them to the cold war’s “nuclear triad” principle of siloed, air-borne, and nuclear submarine […] Continue reading →

With Data Breach Costs Up You Will Be Quite Surprised What The Third Reason Is For This – Chuck Leaver

Written by Patrick Kilgore presented by Chuck Leaver CEO Ziften. Recently 2 major reports were published that celebrated large anniversaries. On the one hand, we saw the Mary Meeker 20th yearly Internet research study. Some of the original industry analysis on the Internet was led by Meeker many years earlier and this report saw her […] Continue reading →

Organizations Must Pursue Data Loss Prevention Strategies Because Data Breaches Are On The Rise

By Ziften CEO Chuck Leaver For US businesses the incident of a major cyber attack and substantial data leak is looking more like “when” instead of “if”, because of the new risks that are presenting themselves with fragmented endpoint strategies, cloud computing and data extensive applications. All too frequently companies are ignoring or improperly dealing […] Continue reading →

Endpoints Are Becoming The Channel Of Choice For Widespread Malicious Cyber Attacks – Chuck Leaver

From The Desk Of Chuck Leaver CEO Ziften Technologies With the introduction of bring your own device (BYOD) methods and cloud computing the securing of particular endpoints has become more difficult, as administrators could be making ease of data access a priority over security. The risks are there however, since most of the present generation […] Continue reading →