CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
Reviewing 2018 attacks, Jon Clay of Trend Micro, says social engineering persists, including phishing attacks, while criminals also continue to steal credentials, lob ransomware at targets and push cryptomining malware.
What's hot on the cybersecurity legal front? For starters, in 2018, the U.S. Department of Justice indicted twice as many alleged state-sponsored attackers than it had ever indicted, says Kimberly Peretti of Alston & Bird.
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
At a time when fraud schemes are evolving and anti-fraud solutions are in high demand, it's also time for organizations to ensure their security controls are both effective and convenient. T. Kendall Hunt, CEO of VASCO Data Security, tells how in this video interview.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.
Not all threat intelligence is created equally, says Fortinet's John Maddison. And it's not just external threats organizations should be most concerned about. Why more businesses need to focus on inside-out security.
David Frymier, the chief information security officer at Unisys, says the IT services company believes it will be a more secure company by adopting the federal cybersecurity framework.
At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.
This year's event was bigger than ever, overwhelming to take in, and no single challenge, strategy or solution emerged as a top priority - very much a reflection of today's information security marketplace.
Despite active attacks against the vast infrastructure that was created to support the 2012 Olympics, the games proceeded without a hitch. But making that happens required unprecedented levels of cross-vendor collaboration, says BT's Jason Cook.
Organizations are at greater security risk than ever, but they also continue to struggle to obtain adequate security staff. Robert Stroud of ISACA offers new recommendations to address the staffing shortage.
There may be no single theme at RSA Conference 2015, but cyberinsurance is a recurring hot topic. ISMG's executive editors share their insights and highlights from the San Francisco security event.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.