The United States will soon officially have a single agency that takes the lead role for cybersecurity. Congress has passed legislation to establish the Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security. The measure awaits President Trump's signature.
As the threat landscape evolves, it becomes a game of survival of the fittest. Only the best attacks and attackers remain standing, and the result is a series of targeted ransomware attacks that now cost global enterprises millions of dollars per year. This is among the important findings of the Sophos 2019 Threat...
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, as...
Join our expert as we look into some of the most effective and crippling threat trends from the last quarter, including a rise in the use of cryptojacking with refined sophistication, making it harder to detect.
Watch this webinar to learn more about:
The current threat landscape and future trends to watch out...
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
Many of the devices that go into so-called smart cities and buildings are not built to be secure, making it difficult for security operations centers to manage risk, warns Sarb Sembhi, CTO and CISO of Virtually Informed, who describes what needs to change.
We know that cybercriminals and even nation-states are taking advantage of the clues we leave behind in our digital footprints. How can investigators and researchers take advantage of this same open source intelligence? Former RAF investigator John Walker discusses the perils and promise of OSINT.
As internal communication becomes a top priority for companies as departments are no longer acting in silos, companies must look for new ways to drive internal efficiencies and improve workflows for their staff. Companies are moving past email to various unified comunication platforms, allowing staff to communicate on...
Implementing an end-to-end privileged access management solution should follow a defined process to
minimize costs and distractions, and speed results.
Throughout the process of selecting and deploying your privileged access management solution, keep in
mind these business requirements, as they will help you sell...
In the wake of a breach at Hong Kong's Cathay Pacific airlines that involved unauthorized access to personal details on 9.4 million passengers, security experts are weighing in on factors that might have contributed to the incident. So far, the airline has provided only sketchy details.
Facebook has been slammed with the maximum possible fine under U.K. law for "a very serious data incident" that exposed an estimated 87 million Facebook users' personal details to political campaign influence firm Cambridge Analytica.
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Download this Gartner Magic Quadrant to learn how SIEM enables users to:
Gain a single, comprehensive...
Although some global payment organizations apparently have failed to meet the Bank of India's October 15 deadline for storing all Indians' payment data domestically, the nation's central bank reportedly has ruled out extending the deadline and is demanding a status report.
VPNs were created for the networks and business environment of
yesterday but what worked 20 years ago cannot be trusted today.
Your VPN is cumbersome and time consuming from a management and
performance perspective. But what you might not want to concede
is that VPNs, by their very nature, pose a...
The latest edition of the ISMG Security Report features an analysis of the results of over 1,000 cyberattack investigations in the U.K. Also: an update on the proposed NIST privacy framework and a report on voter registration information for sale on the dark web.