Ask a group of security analysts about the challenges of working in cybersecurity, and you'll likely hear some common themes, like a high volume of security alerts, too many security point-products to manage, and a shortage of skilled cybersecurity talent.
Many teams have turned to security orchestration,...
U.S. prosecutors this week unsealed an indictment against the alleged hacker "Fxmsp" after his identity was revealed in a cybersecurity firm's report. That sequence of events has raised questions about information sharing and highlighted law enforcement's reliance on private cybersecurity researchers.
Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
To battle against a surge in cybercrime during the COVID-19 pandemic, enterprises need to take several steps, including periodic vulnerability and risk assessment tests and regular audits, says Rajan Pant, founder of IT-SERT of Nepal. Pant also is calling on the government to take action.
Organizations that have shifted to a remote workforce as a result of the COVID-19 pandemic should help in the battle against cybercrime by reporting all security incidents to law enforcement officials for investigation, says Brijesh Singh, inspector general of police, the government of Maharashtra.
To deal with the problem of "shadow IT" during the COVID-19 pandemic, organizations should put in place redefined compliance and governance policies, take a multilayered security approach and adopt a security framework to prioritize risks, a panel of three experts advises.
When it comes to the organization's overall security posture, which includes the technology stack but also incorporates elements such as procedures, processes and human behaviors, the confidence of the security professionals we interviewed was far from strong. In fact, 70% expressed some sort of dissatisfaction,...
Because so many organizations and government agencies are functioning in silos, a key component to India's soon to be finalized cybersecurity policy is the creation of an interministerial task force to respond to growing threats, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.
The year 2019 saw a marked increase on breach responses services for small-to-midsized businesses. Kristin Judge, CEO of the Cybercrime Support Network, outlines the state of cybersecurity for the midmarket.
Investing in a Security Orchestration, Automation and Response (SOAR) platform is a wise and highly strategic decision in combination with your Splunk deployment. But do you know what criteria you should consider when evaluating which SOAR platform to choose?
Download your complimentary copy of "The SOAR Buyer's...
The Cyber Security Agency of Singapore has come up with an operational technology and cybersecurity master plan aimed at building a secure and resilience ecosystem to protect critical infrastructure. But will implementation prove feasible?
Lft. Gen (retired) Rajesh Pant, India's national cybersecurity coordinator, emphasizes in an in-depth interview that the government must engage the private sector in its ongoing efforts to protect critical infrastructure.