Organisations of every size are experiencing a problem as their operations digitally transform. They are unable to secure mission-critical workloads on cloud-based infrastructure without increasing risk, operational friction, or introducing compliance violations.
However, creating simpler and faster user-based...
How can we secure access to mission-critical workloads on cloud-based infrastructure without increasing risk, operational friction, or introducing compliance violations?
As security professionals, we're trying to solve today's complex problems, but are hampered by yesterday's tools. Fortunately, there are...
On the eve of Europe's biggest annual cybersecurity conference, and scores of interviews with some of the world's leading information security experts, I'm asking how the London Bridge attacks will change the tenor of at least some of these discussions.
Markus Jakobsson, Chief Scientist at Agari, has released a new book focused on socially-engineered schemes. What are the key takeaways, and how can security leaders improve their abilities to fight back against the schemers?
A recently reported health data breach in Colorado offers a reminder that organizations must take precautions to prevent and detect data leakage involving current and former employees inappropriately using personal email.
How Prepared Is Your Organization to Defend Against Today's Advanced Threats?
Ashley Madison, Sony, JPMorgan Chase - what's your confidence that when the next big security incident erupts, your organization will be prepared to defend itself? Are you getting the security you expect from the investment your...
The United States Coast Guard faces challenges in protecting the private information found in medical records of its personnel and their families, a Department of Homeland Security inspector general report says.
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
The GAO says the Department of Homeland Security has failed to develop a strategy to secure computers in federal facilities that monitor and control building operations, opening a potential door to security breaches.
The Internet of Things brings many benefits, but it also brings with it new challenges: namely, the increased risk of cyber-attack. Our traditional concepts of cyber defense must evolve to keep pace. Join this session for expert insight on:
The convergence of IT and OT cybersecurity functions, as well as the...
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.