Chris Pierson of Viewpost offers an assessment of the impact the Trump administration could have on cybersecurity in the government and private sectors and sizes up the role of emerging technologies.
This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
The uptick of ransomware and other cyberattacks in the healthcare sector has prompted healthcare provider RWJBarnabas Health to make a number of important moves to help prevent, detect and respond to breaches, says CISO Hussein Syed.
STOP THE BREACH: Reduce the Likelihood of an Attack Through an IAM Maturity Model.
Forrester estimates that 80% of security breaches involve privileged credentials.
In December 2016, Centrify commissioned Forrester Consulting to evaluate identity and access management (IAM) practices and technology among large...
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
As one of the FBI's top cybercrime investigators in San Francisco, M.K. Palmore helps many enterprises respond to ransomware and other cyber intrusions. What lessons can he share from investigations?
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
As organizations struggle with finding the delicate balance of cybersecurity and customer convenience, Mordecai Rosen of CA Technologies says behavioral analytics and machine learning will help.
As a veteran security practitioner, Sam Curry of Cybereason is tired of the attackers having the advantage. He wants to see the tables turned, and he believes behavioral analytics just might be the technology to make it happen.
In the age of ransomware and business email compromises, email security has taken on new significance. And Zix, the email security provider, has rebranded itself to respond. Dave Wagner, Zix CEO, discusses the latest threats and defenses.
As former CIO of a large government agency, Charles Armstrong is painfully aware of email security issues. Now, as an independent consultant, he's helping organizations defend against them.
The Healthcare Information and Management Systems Society's 2017 Conference will offer a slew of educational sessions and informative exhibits focused on top cybersecurity and data privacy challenges facing the healthcare sector. Catch our coverage.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
This monthly Security Agenda will highlight some of the most recent additions to our course library. February's edition features Gartner analyst Avivah Litan discussing "Endpoint Detection and Behavioral Analytics." Other industry influencers like RSA's Principal Manager of Identity Protection, Angel Grant, Co-Founder...
In today's threat landscape, why do we need a "cognitive" security operations center? Denis Kennelly of IBM Security defines the term and makes the case for taking action.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.