The challenge of wanted to adopt the latest and greatest point products, as opposed to opting for a more platform-based approach, seems never-ending, and can only be managed by bringing greater amounts of automation to bear, says Skybox Security's Michelle Cobb.
Life after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able to rapidly respond to the next big cyberattack against Europe. But with warnings of ongoing Russian election interference campaigns, the next big attack may already be underway.
Federal regulators and medical device maker Medtronic have issued new warnings about cybersecurity vulnerabilities in certain cardiac devices from the manufacturer that could potentially allow attackers to manipulate the products' functionality, posing safety risks to patients.
What is the role of professional certification companies in the cybersecurity education ecosystem? In part one of a two-part panel discussion on the future of cybersecurity education, John McCumber of (ISC)2 and Rob Clyde of ISACA share their philosophies.
What are America's universities doing to help fill the cybersecurity skills gap felt by enterprises worldwide? In part two of a two-part panel discussion on the future of cybersecurity education, Lisa Ho of the University of California-Berkeley and Amit Elazari Bar On of Intel Corp. offer insights.
Multifactor authentication remains an industry best practice
for preventing unauthorized account access. Our analysis this
year found that, overall, 45% of businesses are using multifactor
authentication. This is a significant increase from last year's
24.5%. Encouragingly, more businesses are augmenting
Forget inside/outside the perimeter when mitigating
risks. That's the notion behind "zero trust," which means
applying risk-based controls to safeguard access.
Download this whitepaper to learn more about:
Cloud service attack trends;
Best practices for mitigating risks;
How to make the concept of "zero trust"...
Aluminum giant Norsk Hydro has been hit by LockerGoga ransomware, which was apparently distributed to endpoints by hackers using the company's own Active Directory services against it. To help safeguard others, security experts have called on Hydro to release precise details of how it was hit.
The FDA is generally on the right track in updating guidance for the cybersecurity of premarket medical devices. But a variety of changes are needed, say some of the healthcare sector companies and groups that submitted feedback to the agency.
In today's hyper-connected enterprise, organizations are at risk of two different types of attack. Larry Link, CEO of Cequence Security, explains how to defend at a platform level - without adding friction.
As Cloud migration continues to be more pervasive, the struggle between IT management keeping pace with the complex digital business infrastructures of new cloud assets and Security teams ensuring their organization's posture is secure, while both teams try to please business units is not uncommon. There are ways to...
At Splunk, we're working on creating a data-driven future - embracing new developments around artificial intelligence (AI) and machine learning (ML), IT operations, security and IoT. The goal: to generate positive outcomes from your data.
Pulling together insights from thousands of our customers and our dedicated...
Machine data is generated by many sources, including industrial control systems and applications, sensors and connected devices; it is also one of the fastest growing and complex areas of big data.
Real-time insights from industrial data enable organizations to reduce costs, optimize industrial operations,...
As your organization progresses through its DevOps journey, what are the best practices that successful teams use that you should follow? Puppet and Splunk surveyed more than 3,000 participants and the findings reveal a set of core DevOps practices that are critical for mission success. Discover what separates...