Welcome to Google Cloud's Cybersecurity Edition of the First Annual Generative AI Survey, brought to you by Information Security Media Group (ISMG). This survey of over
400 business and cybersecurity professionals conducted in
H2 2023 comprises responses from two groups, business
leaders – comprising CIOs, board...
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
Cybersecurity learning is a critical part of any cybersecurity program. Cybersecurity professionals must
continuously upgrade their knowledge to cope with the rapid evolution of cyber threats. Organizations
need new skills to confidently deploy emerging technologies that power competitive advantage....
Cybercrime is growing exponentially. Developing a robust cybersecurity workforce is vital for enterprises to address the evolving cyber threat landscape effectively.
Decision-makers and cybersecurity leaders should drive effective defense by implementing actionable steps, empowering them to build a skilled,...
To outsource a non-core competence...or to risk control, understanding cost implications, and/or ability to evaluate functionality in competing offerings? That's the question...right?
This report has been a collaboration between ISMG and Optiv since the beginning of 2023 when ISMG surveyed 426 senior cybersecurity...
From SolarWinds to Kaseya, Accellion, Log4j and Okta, third-party security breaches are among the most devastating for organizations affected. Tony Morbin of ISMG dives into the story behind the results of a global survey with Demi Ben-Ari, the co-founder, CTO and head of security at Panorays.
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
Veracode recently released its first State of Software Security: Open Source edition report to analyse data on open source libraries that could expose companies to data breach risk. We found that 71% of all applications contain flawed open source libraries, and that the majority of those flaws come from downstream...
Modern IT teams must maintain compliance with an evolving set of regulatory standards, track and secure sensitive data across endpoints, and manage a dynamic inventory of physical and cloud-based assets, all while fulfilling an increasingly common executive mandate to make technology an enabler for business...
According to the VMware Carbon Black Threat Analysis Unit (TAU), retail organizations may see a noticeable spike in attempted cyberattacks during the holiday season. This guide is an introduction to the world of cybersecurity-it's history, language and resources-so you can further educate yourself on this rapidly...
Case study: Learn about several companies' experiences using Neustar UltraDDoS Protect
DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability.
As...
The global cybersecurity skills shortage is real, and it's deeply impacting organizations' abilities to implement and manage new technology tools. But worse, it's also affecting how organizations assess their adversaries.
What does the security team need to do? What requires protecting in the business? Where is it,...
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology infrastructure: to be secure, compliant, and well-managed.
Download this whitepaper and learn about creating:
Integration of data relevant to security, compliance, and...
The HITRUST Cyber Threat XChange (CTX) is sharing bi-directional indicators with the Department of Homeland Security. HITRUST's Cyber Lab, in partnership with Trend Micro, identified malicious indicators of compromise several weeks in advance of the WannaCry outbreak. CTX members were able to automatically receive...
Companies in all sectors are faced with substantial challenges to prepare for GDPR. Regulators and supervisory authorities in charge of data protection wield a number of hefty sticks with which to enforce the new regime under GDPR.
To help your organisation prepare, download this whitepaper and learn:
If GDPR is...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.