Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
Virtualization and related developments bring significant changes to the architecture of today's data centers. At RSA Conference Asia Pacific & Japan, Cisco's Munawar Hossain defines these changes and outlines the new challenges.
Cybercrime is growing as an industry, developing capabilities to target large entities. Ernst & Young's Ken Allan recommends a three-stage strategy to combat threats and urges CISOs to set new priorities.
Put your personal feelings aside; what's dangerous about the AshleyMadison.com breach is that ideologists will now go beyond taking down an IT system and actually destroy a business. This evolution, says cybersecurity expert Carl Herberger, requires a new way to assess and mitigate risk.
Robin Slade of the Santa Fe Group says current vendor risk evaluation methods are inefficient. She advocates peer collaboration through shared assessments of vendors to help improve management of third-party risks.
Raimund Genes' keynote at RSA Conference Asia Pacific & Japan is an appeal to the information security community to start putting security in perspective, emphasizing new approaches that address the changing threat landscape.
DNS hijacking is the most common attack being investigated by Akamai's incident response team, says APAC CTO Mike Smith. He shares some background on the subject and his session on it at RSA Conference APAC.
Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
As more enterprises adopt software-defined networking, hackers are finding the emerging technology to be a new route to penetrate organizations. Anthony Lim of (ISC)² recommends ways to secure SDNs against attacks.
After the OPM breach, the U.S. and China recently agreed to hammer out a cyber "code of conduct." But John Pescatore, a director at the SANS Institute, argues that governments would be better served by first jointly combating cybercrime.
OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
The new chief executive of the Center for Internet Security, which operates the Multistate Information Sharing and Analysis Center, sees mutual cooperation among enterprises as a way for organizations with limited staff to address critical IT security problems.
Organizations that want to protect sensitive data first need to know where it is. But outside of military and government realms, few employees know how to manually classify data, or have an incentive to do so, says TITUS CTO Stephane Charbonneau.
With the rise in awareness of visual security threats and the advent in open plan office environments, protecting data inside the organization is a growing concern, says Ben Rooney, a marketing executive at 3M.
Employing context-aware security can reduce the risk of a hacker mimicking a legitimate user to illicitly access a system, says Bill Evans of Dell Security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.