Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
Amit Yoran, president of RSA, says Asian organizations must re-think their approach to security. He outlines five key steps to building a resilient cyber defense mechanism. But how do security leaders respond?
The wildfire growth of mobile apps has added to the security challenges of financial institutions that provide this highly in-demand method of account access. The risks are substantial but there is a way to reduce exposure while enhancing customer convenience.
Download this white paper to explore
The...
Organizations are getting increasingly prioritizing incident response capabilities by putting investigation firms on retainer, or creating their own internal teams, says Patrick Morley, president and CEO of Bit9 + Carbon Black.
Attackers today continue to refine their distributed denial-of-service attack capabilities, delivering downtime on demand. The increase in attack effectiveness and volume demands new types of defenses, says Akamai's Richard Meeus.
IT security today is an illusion. We spend more and more on security software and compliance processes, yet every week we hear about another company losing corporate emails or exposing their customers' personally identifiable information to disgruntled insiders or ever-more sophisticated hackers.
With the explosion...
The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century. The Internet is no less significant in transforming the world economy than the sextant or steam engine. However, the benefit of the Internet has brought with it a dark side; a side that is...
A federal judge has dismissed a class action lawsuit filed against eBay in the wake of a 2014 data breach that exposed encrypted passwords and personal information for 145 million users.
In the wake of a breach, most organizations struggle with a number of concerns related to response, mitigation and notification. While immediate and full disclosure of a breach, in theory, sounds like the most practical advice, it's not always the best move for every organization. The nature of the breach, whether the...
BitSight Technologies conducted research on breached organizations and how they were impacted by botnets. The results are eye-opening, says CTO Stephen Boyer, offering insights from this study.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses - even sandboxing. You need a new approach. This SlashGuide white paper helps you understand advanced...
A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream. This summary by Network World lays out the facts but also presents an approach to detect malware and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.