Detecting, investigating and responding to cyberthreats has never been more important or challenging for enterprises. In this white paper, you’ll learn:
Why it’s critical for all enterprises to be able to quickly, and reliably detect and respond to true threats.
The new and fluid challenges SecOps teams must...
Cybersecurity faces a hiring and retention “perfect storm” during The Great Resignation. The cost of acquiring talent from a limited pool is so high that companies will have to take decisive action to retain people rather than let them walk out the door. This Technical Staff Retention Cheat Sheet is for IT,...
Ransomware attacks are no longer an “if” but a “when” they will happen. It’s become business-critical to invest in ransomware preparedness and cyber resilience. Following a ransomware attack, finding the root cause and determining the blast radius can be extremely time-consuming, if not near impossible with...
Modernizing your security operations can accelerate growth and eliminate risk — especially on your journey to the cloud. By having visibility across multicloud, hybrid and on-prem environments, you can better detect targeted attacks and malicious activity.
End-to-end visibility can:
Establish better security...
Organizations lack a basic understanding of "the landscape of security vulnerabilities," says U.K.-based cybersecurity expert John Walker. He discusses the state of cybersecurity today - including why he prefers the term "verified trust" to Zero Trust - and offers predictions for 2022.
Since mid-December, enterprises globally have been responding to the urgency of the Apache Log4j zero-day vulnerability. John Ayers of Optiv discusses Optiv MXDR and how it helps customers detect, respond and provide visibility to protect from potential exploits.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including mitigating the Apache Log4j zero-day vulnerability, findings from a new report analyzing the Conti ransomware attack on Ireland's Health Services Executive and President Biden's drive to...
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
The U.S. Department of Homeland Security this week announced a "Hack DHS" bug bounty program to identify potential cybersecurity vulnerabilities within its systems and to increase DHS' overall cyber resilience. Hackers uncovering vulnerabilities will be compensated by the department.
Large financial services companies are prime targets for a broad variety of threat actors, including the most persistent nation-state sponsored outfits. From closing gaps in visibility to achieving a more proactive security posture, the following whitepaper illustrates how any organization can benefit from the access...
Like CISOs everywhere, Dawn Cappelli of Rockwell Automation awoke last Friday to news about the Log4j vulnerability and the risk it posed to her company, customers and partners. Here is how she approached triage, response and capturing insights to be shared with other security leaders.
The year is ending with a cybersecurity bang - not whimper - due to the widespread prevalence of the Apache Log4j vulnerability. Researchers warn that at least 40% of corporate networks have been targeted by attackers seeking to exploit the flaw. More than 250 vendors have already issued security advisories.
In today's disparate IT environment, there are gaping, business critical gaps in enterprise log management. Graylog's Mark Brooks discusses the Log Management Maturity Model and the six (6) critical steps to move from "no alignment" to "continuous improvement."
It's no surprise that as some ransomware-wielding criminals have been hitting healthcare, pipelines and other sectors that provide critical services, governments have been recasting the risk posed by ransomware not just as a business threat but as an urgent national security concern.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.