As more security technology companies emerge, consolidate and disappear, CISOs are struggling to understand which products are really worth their investment. Absolute’s Director of Security Strategy Josh Mayfield shares how CISOs can cut through the product marketing jargon and break down the five questions every CISO should ask a potential security vendor.
The most successful incident response programs excel in five areas: visibility, incident management, workflows, threat intelligence, and collaboration/information-sharing. DFLabs Senior Product Manager John Moran explains what’s required to achieve excellence in each of these components from a systems level perspective.
99% of successful attacks involve vulnerabilities that have been known to cybersecurity professionals for at least one year. Nollaig Heffernan describes the issues that exist today with applying software patches, primarily at the application layer, and advises on how to mange the patching effort and where priorities should lie for organizations.
We kicked off 2017 with a lot of excitement around a nasty set of SMB vulnerabilities which led to the devastatingly successful WannaCry and NotPetya attacks, and 2018 started off with a similar level of excitement concerning the Spectre and Meltdown vulnerabilities. Ivanti’s Chris Goettl discusses which trends have surfaced and what to watch for during the rest of the year.
The #CyberAvengers, a group of salty and experienced professionals, offers a few quick tips that set up a cybersecurity early warning system, giving you a chance to make sure your “cyber fire” does not get out of control.
Organizations of all sizes are vulnerable to cybersecurity threats, and they need to be able to detect indicators of compromise in order to address risks and respond to attacks. Integrating SIEM and SOAR combines the power of each to create a more robust, efficient and responsive security program – which ultimately allows security teams to avoid alert fatigue.
Today’s CISOs have one thing in common: the pressing need for funding to keep their security programs vital. Worldwide IT security spending jumped nearly 8 percent in the past year to top $90 billion, and it’s forecast to climb above $113 billion by 2020, but despite these numbers, executive decision-makers now want InfoSec costs inexorably linked to business value and return on investment.
For organizations, the average total cost of a data breach is over $3 million. For employees or customers, the cost is a loss of privacy, identity theft, and immediate or future monetary loss. Here's why automation is the core of data protection and why it should be a business priority this year.
The threat of cybercrime continues to grow, and small and medium-sized businesses (SMBs) should be especially concerned as they lack the IT budget and resources that larger enterprises have and are thus more likely to struggle after suffering a breach. For those guilty of letting their website security strategies sit on the back burner, SiteLock president Neill Feather suggests that it may be time to consider a strategy refresh.
Choosing a cybersecurity team should be a top priority for any organization, but it's often a challenge for a business to find qualified candidates. Dr. Eric Cole, CEO of Secure Anchor, provides four keys to finding the right cybersecurity expert for your company.
Enterprises are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges.
The growing complexity of the cybersecurity industry is undeniable. Through personal examples, Expert Javvad Malik explains why complex problems don't always require complex solutions, pointing to examples such as hybrid cars, which are extremely complex technically, but seamless to use for a consumer.
There are plenty of security solutions designed to secure the fences that are the first line of defense in most organizations, but what about the threat from within? Expert Ameesh Divatia looks at why insider threats are the next big security challenge.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.
While it may be impossible to completely prevent all types of security breaches, there are certainly steps you can take to make sure you don’t become another headline. Satyendra Tiwari shares his 8 tips to help prevent security breaches.
Even with a plethora of tools available, far too often, password security is overlooked. In this Experts Corner, expert Aaron Walker looks at research from G2 Crowd as he highlights 8 tools to help companies better manage passwords.
Recent claims from “Guccifer,” the Romanian hacker who allegedly accessed then-secretary-of-state Hillary Clinton’s supposedly “secure” email server and posted classified emails to the Internet, have brought into question exactly how “secure servers” are defined and whether they actually exist.
Though enterprises and government entities take stringent measures to protect their perimeters, their server farms and the files and workloads in them, can the actual server itself ever be said to be truly secure?
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue.
Information security expert Eric Schou looks at 4 steps to consider when adopting a security framework that is focused on prevention.
Enterprise-sponsored bug bounties continue to grow in popularity. With that growth have come debates about the best ways to manage the risks involved with paying unknown researchers and hackers to find vulnerabilities.
When people think about information security, they often think about blocking malware, preventing system attacks and encrypting data. While traditional security measures are certainly a must, it’s important for organizations to also consider their data in the context of their business.
Expert Ryan Duguid shares his thoughts on workflow automation can help companies ensure security in a variety of business processes.