Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider.
Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-ea....
Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.
While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs.
As cloud adoption soars to new heights, security standards have failed to keep pace. Organizations need to start taking responsibility for their own cloud security and these five practical tips will help.
With the CCPA coming hot on the heels of the GDPR it makes sense to get your consumer data management in order. Taking steps to protect all private data today will pay dividends tomorrow.
As more and more exploitable endpoints find their way onto our networks we need to act to secure them. This article will highlight practical strategies to help you secure IoT, mobile and other devices that require attention.
As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.
The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of celebrity and what ....
Learn why security experts should be looking at blockchain.
Make sure you understand the need to operationalize data management and security.
Find out why phishing is starting to focus on mobile devices...and what you can do about it.
Securing the new endpoint: Making the IoT transformation safe for enterprises.
A look at some options for keeping tabs on your staff and the possible pros and cons.
Learn about best practices to combat the threat of ransomware.
58 data records are stolen every second at an average cost of $141 each.
Policies and software are not enough to secure your data, staff must be regularly trained.
It may be possible to glean valuable security insights by monitoring the dark web.
Skills shortage is making shift to continuous appsec testing challenging.
Deep learning can be a vital supplementary tool for cybersecurity.
Coming to a future near you: software code that mutates and evolves.
Why you need to go beyond compliance.
Any breach of the General Data Protection Regulation or failure to meet GDPR compliance could lead to severe fines.
Small and mid-sized businesses are at most risk and so have greater need.
Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not.
The need for continuous monitoring, effective metrics and skilled workers.
Diving into NIST Special Publication 800-53 for practical advice.
Virtual Chief Information Security Officers needed to comply with New York regulations
We need to convince people to proactively guard against ransomware.
NIST cybersecurity framework (CSF)
Third-party risk is very real – your company’s reputation may be in your vendor’s hands.
CISOs can't wait until after a breach to talk with their board of directors. They must have regular discussions to ensure they're on the same page on security priorities.
Here are seven simple steps that will safeguard you and your business from phishing attacks.
Coupled with solid perimeter defenses, user behavior analytics is a powerful asset in the fight against data theft.
Security is taking a backseat as more IoT devices connect to the internet, making it possible for botnets to attack networks.
Anatomy of a national point-of-sale hack and takedown of more than 1,000 marijuana dispensaries
Most successful targeted attacks follow six steps or stages, though it's important to remember that these steps often run in parallel.
Cognitive security systems could be a powerful ally in the fight against cybercrime, providing early threat detection and autonomously responding to threats.
We need to secure the internet of things.
A mix of fresh and familiar threats and problems will concern IT departments in the year ahead.
Find out how to prepare for new EU legislation on data collection and data protection.
When it comes to measuring the cost of a data breach, size matters. The more records lost, the higher the cost.
The key to securing against data breaches lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water.
Critical Security Controls: Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20.
The National Security Agency (NSA) should disclose all zero-day exploits. But it doesn't.
When should you hire a virtual chief information security officer (CISO)?
Stay on top of account management and assess staff cybersecurity skills with CIS Controls 16 and 17.
Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace.
Universities and colleges are a prime target for cybercriminals, making information security (InfoSec) a major concern.
LinkedIn's hacks prove the social networking site needs to protect data better and that users must follow secure password practices.