This edition of the ISMG Security Report discusses the latest improvements in deception technology and how best to apply it. Also featured: a report on the growth of mobile fraud, plus insights on Merck's experience recovering from a NotPetya attack.
Deception technology is attractive in that it offers - in theory - low false positives and critical clues to attackers' methodologies. But the benefits depend on its ability to fool attackers and whether organizations can spare the time to fine-tune it.
Deception technology has been on security leaders' radar some time, but now it is becoming accessible to smaller organizations. And in their most recent analyses, market analysts give deception technologies kudos for improved sophistication and maturity.
Deception focuses on deploying assets - such as lures, bogus...
For results-oriented security leaders seeking to rationalize their security stack, deception solutions can solve more than just the internal threat detection problem. This session will cover case studies where deception is used to not only amplify internal threat detection, but also improve threat prevention and...
Deception technology is becoming more sophisticated, enabling organizations to battle against emerging threats, says Alissa Knight, senior analyst at Aite Group, a research and advisory company.
The latest edition of the ISMG Security Report analyzes the significance of fines against British Airways and Marriott for violations of the EU's GDPR. Also featured are discussions of California's privacy law as a model for other states and the next generation of deception technologies.
With attackers continuing to hammer weaknesses in software, organizations must prioritize application security more than ever, says Ian Ashworth of Synopsys. Thankfully, developers and middle management - bolstered by agile methodologies and DevOps - are increasingly leading the charge.
Do you know how attackers can move once they're inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals...
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive's technology is helping these organizations stay ahead of advanced attackers.
Download this report to learn how...
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will...
It's becoming increasing important to detect adversaries that have bypassed your security controls and moved laterally in your environment, says Carolyn Crandall of Attivo Networks, who describes the role deception can play.
The recent Black Hat Europe conference in London touched on topics ranging from combating "deep fake" videos and information security career challenges to hands-on lock-picking tutorials and the dearth of research proposals centered on deception technology.
Deploying deception technology as an additional layer of defense at the initial stage of planning and budgeting will help organizations have better visibility into networks to detect threats, says Prakash Padariya, CISO-Technology Center, GE.
When should a technology or security leader get involved in M&A? The short answer: as early as possible. Security
really should play a prominent role before, during, and after the acquisition activity.
Download this eBook to learn more about:
High-profile incidents of cyber disruption during M&A;
How security...
A security breach is always a sensitive topic - but especially so during a merger or acquisition.
When should a technology or security leader get involved in M&A? The short answer: as early as possible. Security
really should play a prominent role before, during, and after the acquisition activity.
Download...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.