Critical National Infrastructure refers to the various systems, networks, facilities and services upon which daily life depends. One such infrastructure is our power networks that are responsible for providing us with electricity that has become central to the ability of modern societies to function. Apart from being...
Building Security in Maturity Model, BSIMM: What is it and How Your Organization Can Leverage the Data
Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts...
Benchmarking your software security initiative can tell you if you are keeping pace with your peers, or if you should accelerate your efforts to rise above the competition. The results of a benchmarking assessment can help you identify new security strategies and prioritize scarce resources to be most effective....
Like it or not, good grades matter. As organizations become increasingly focused on benchmarking internal groups for their ability to run efficiently and add business value, cybersecurity teams must be positioned to measure their programs' effectiveness and sophistication against industry standards.
In this second...
Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits.
IT infrastructure monitoring has long been the foundation for managing systems and application performance, availability and reliability. Today, monitoring solutions are needed more than ever due to huge increases in infrastructure scale and complexity, growth in cloud architecture deployments, and demands for a...
Compliance regulations such as SWIFT and GDPR can be challenging to understand and implement. Many of these regulations have cybersecurity requirements that are focused on protecting critical banking infrastructure with aggressive timelines - and without disrupting the very business-critical systems you're trying to...
The latest edition of the ISMG Security Report features Barbara Simons, co-author of the book "Broken Ballots," discussing why she believes it's a "national disgrace" that some states are relying on computer voting with no provision for recounts. Also: Update on breach lawsuit against Premera Blue Cross.
Tenable Research's analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management.
Download the report now to:
Find out more about Tenable Research's analysis...
What are the keys to successful threat-intelligence sharing between the public and private sectors? And given what we saw in 2016, how do we ensure the security of the 2018 mid-term election? This session explores how the private sector can use the government's experience and apply it, and develop public/private...
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace.
This whitepaper explores...
Critical infrastructure - energy, defense and transportation among the components - forms the backbone of a nation's economy, security and health. Hence, it is imperative to secure critical infrastructure elements, such as power grids, communication and finance.
State-sponsored attacks are gaining momentum and...
Critical infrastructure protection is an integral part of cyberspace and these assets play a vital role in supporting many of our daily activities, including water and power usage, financial transactions, telecommunications, and so on. Today, the reliability, high performance, continuous operation, and protection of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.