The cybersecurity community is heavily focused on what attackers are doing. While threat intelligence and vulnerability research is invaluable, it only represents one side of the equation. Far less research has been dedicated to how defenders are responding.
Download this research paper for in-depth analysis...
Digital transformation is putting pressure on every organisational function - especially IT Security.
But how and why does digital assets provide great benefits? And why is collaboration key to securing a dynamic IT environment?
This eBook shares perspectives on how your peers are beginning their Cyber Exposure...
Many companies are struggling with cybersecurity. In fact, 52% of respondents to the Dimensional Research survey "Trends in Cybersecurity Frameworks and Foundational Controls" said their cybersecurity program either has major gaps or weaknesses, or many minor ones.
This whitepaper gives great insight as to how...
Today's networks are constantly evolving and so are their attack surfaces.
IT security professionals must now contend with digital assets that many of their predecessors never contemplated, such as cloud platforms, application containers, web applications, IoT devices, and network-connected operational technologies...
As companies look for new ways to drive internal efficiencies and improve workflows for their staff, many are turning to digital transformation. However, with any advancement in technology or process, we inevitably see an increase in threat surface and attack vectors. What does digital transformation truly mean to...
Even though many organizations believe that supply chain cyber risk is a serious problem, very few organizations are vetting their suppliers, says CrowdStrike's Michael Sentonas.
Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is but one of the findings of the new 2018 Global State of Online Digital Trust study commissioned by CA Technologies. CA's David Duncan analyzes the results.
Hubris has a new name: Bitfi. The cryptocurrency wallet-building company, backed by technology eccentric John McAfee, earned this year's not-so-coveted Pwnies Award for "Lamest Vendor Response" for how it mishandled security researchers' vulnerability disclosures. Bitfi has promised to do better.
The FIN7 cybercrime gang regularly phoned victims, posing as buyers, to trick victims into opening phishing emails and attachments with malware, federal prosecutors allege. The group's success - 15 million stolen payment cards and counting - is one measure of how difficult these types of attacks are to block.
A WannaCry outbreak has hit unpatched Windows 7 systems at Taiwan Semiconductor Manufacturing Co., crippling its factories. The world's largest chipmaker, which traced the infection to a new software tool that it failed to scan for malware before installation, says the outbreak could cost it $170 million.
Web application security is much more than an IT problem. It can become a significant business problem if not handled properly. Attacks on web applications can by-pass your security and harm your business by creating unwanted downtime, reducing availability and responsiveness and shattering trust with your customers...
Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all internet traffic - more than human. It's a complex problem. The difference between bot and human activity is hard to differentiate and we all operate in a system where bots solve many of our business problems....
Cyberattacks should be top of mind more than ever before. These attacks have never been limited to an individual endpoint, an individual system, or an individual company. Threat actors can now spread malicious content and execute attacks all over the world, crossing borders and industries, in a matter of seconds....
The chief security officer for the U.S. Democratic Party is recommending that all party officials avoid using mobile devices made by Chinese manufacturers ZTE and Huawei. Bob Lord says that even if devices from those manufacturers are free or low cost, no one wants to be the next "patient zero."
Retired Brigadier General Gregory Touhill, the first CISO of the federal government, spells out what he sees as the essential steps for fighting against Russian meddling in this year's midterm elections. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.