From SolarWinds to Kaseya, Accellion, Log4j and Okta, third-party security breaches are among the most devastating for organizations affected. Tony Morbin of ISMG dives into the story behind the results of a global survey with Demi Ben-Ari, the co-founder, CTO and head of security at Panorays.
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
Veracode recently released its first State of Software Security: Open Source edition report to analyse data on open source libraries that could expose companies to data breach risk. We found that 71% of all applications contain flawed open source libraries, and that the majority of those flaws come from downstream...
Modern IT teams must maintain compliance with an evolving set of regulatory standards, track and secure sensitive data across endpoints, and manage a dynamic inventory of physical and cloud-based assets, all while fulfilling an increasingly common executive mandate to make technology an enabler for business...
According to the VMware Carbon Black Threat Analysis Unit (TAU), retail organizations may see a noticeable spike in attempted cyberattacks during the holiday season. This guide is an introduction to the world of cybersecurity-it's history, language and resources-so you can further educate yourself on this rapidly...
Case study: Learn about several companies' experiences using Neustar UltraDDoS Protect
DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability.
As...
The global cybersecurity skills shortage is real, and it's deeply impacting organizations' abilities to implement and manage new technology tools. But worse, it's also affecting how organizations assess their adversaries.
What does the security team need to do? What requires protecting in the business? Where is it,...
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology infrastructure: to be secure, compliant, and well-managed.
Download this whitepaper and learn about creating:
Integration of data relevant to security, compliance, and...
The HITRUST Cyber Threat XChange (CTX) is sharing bi-directional indicators with the Department of Homeland Security. HITRUST's Cyber Lab, in partnership with Trend Micro, identified malicious indicators of compromise several weeks in advance of the WannaCry outbreak. CTX members were able to automatically receive...
Companies in all sectors are faced with substantial challenges to prepare for GDPR. Regulators and supervisory authorities in charge of data protection wield a number of hefty sticks with which to enforce the new regime under GDPR.
To help your organisation prepare, download this whitepaper and learn:
If GDPR is...
Given the well-established IT infrastructure of most financial institutions, conventional wisdom might say onsite deployment is the best option for implementing an automated governance, risk and compliance (GRC) solution. This paper provides the top five reasons why the cloud is a better deployment option: zero...
The best approach to building a security policy is by using a comprehensive, layered approach that covers all threats (both new and known). This policy needs to leverage real-time threat intelligence by addressing all threat vectors and all platform types as workloads migrate from physical to virtual to...
Despite all the evidence that automated tools increase the efficiency and effectiveness of most business processes, many financial institutions waste significant time and money using manual processes for governance, risk and compliance (GRC) management. Using outdated techniques in an increasingly complex environment...
In the wake of the $81 million SWIFT transaction cyberheist from the Bank of Bangladesh - the first in a cascade of SWIFT-related heists - regulators and bankers throughout the world have stopped, taken a step back, and reviewed how interbank transactions and payments are managed and operated. The SWIFT attacks have...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.