The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
Mobility and IoT are acknowledged by security practitioners to be a whole different beast when it comes to management. MetricStream's French Caldwell says that GRC likewise needs to change its paradigm to accommodate this disruption.
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud...
Continuous monitoring is among the latest approaches to keep your company safe from hackers. And according to this SANS survey, most organizations claim to have a program for monitoring systems and activities for unauthorized changes, vulnerabilities, abnormal operation, and needed patches. But how effective are...
Traditional signature-based endpoint protection solutions struggle to protect against today's advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with multiple forms of prevention.
Download this...
Cyber risk is high on the list of the most significant risks that organizations face. Many businesses spend millions of dollars annually on people, processes, and technologies to protect themselves against cyber risk.
However, with little visibility into the success
of these investments, many organizations are still...
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
A staggering 1/3 of businesses have experienced lost or stolen staff mobile devices and, of those, 1/4 have lost data as a result.
With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints...
All organizations with an on-line presence need to quickly and efficiently detect hackers and fraudsters. However, to avoid frustrating the very people you want to feel welcome, it's critical that authentication processes be as simple as possible.
The newest generation of authentication technology utilizes shared...
As the borders of the enterprise dissolve in the mobile world, security becomes increasingly important and inherently more complex. Single Sign-On becomes the key to providing a convenient experience when accessing enterprise resources across web, mobile and APIs. Join this webinar to learn how the National Rural...
Some regard the security risks that follow the digital revolution as acceptable trade-offs, more cautious ones are left out in the cold. The digital revolution calls for us to stay open to opportunities, and remain alert for threats. Closing oneself off to something good because of latent threats is impractical. All...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.