Mirai-like, distributed denial of service attacks launched by IoT devices are an indication that DDoS may no longer be an external-only threat facing enterprises, warns Philippe Alcoy of Arbor Networks.
In an in-depth interview, Golok Simli, CTO at India's Union Ministry of External Affairs, sizes up the shortcomings of the Information Technology Act, 2000 and discusses the ongoing challenges involved in protecting privacy.
Vendor risk management is becoming more critical as companies rely more on partners who have access to payment card data and other sensitive information, says Ramon Lipparoni, IT integration manager at ComAir, a South African airline. One critical step, he says, is conducting impromptu vendor audits.
Although more organizations are adopting cloud access security broker technology, CASB policy templates and runbooks, as well as best practices, are still evolving, says Rohit Gupta, group vice president for cloud security products at Oracle Corp.
Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region, says Tata Communication' Avinash Prasad in this exclusive interview.
A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...
Ransomware infections can be devastating, and recovery efforts threaten to financially cripple your organization. Prevention is the most effective defense.
Download this whitepaper and learn 14 ransomware defense best practices including how to:
Implement an awareness and training program;
Enable strong spam...
Every new cybersecurity regulation includes at least some emphasis on improving vendor risk management. But what happens when vendors balk at the extra degree of scrutiny required? Moffitt Cancer Center's Dave Summitt describes his risk-based approach to business associates.
Who is behind the threats that face your organization? To implement security measures that put your attackers on defense, you must know their profile and motivations.
Download this infographic and learn about:
The motivations of different attackers;
The different tactics attackers deploy;
How threat intelligence...
Enterprise intelligence combines human-led analysis and computer-driven analytics to provide actionable insights for your enterprise, so you can disrupt and neutralize threats.
Download this infographic and learn:
How often insider misuse is responsible for security incidents;
The average cost of a single data...
In the face of advanced persistent threats and attacks, it's critical for organizations to measure vulnerability to threats before applying machine learning tools, says Rohan Vibhandik, a scientist at ABB Corporate Research Center.
Determined attackers constantly find new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. Knowing who is behind the threats you face and what their motivations are can help you implement security measures to put them on the defensive.
Organizations and analysts need the ability to shift threat intelligence from a data feed into actionable results - this is the core of applied threat intelligence (ATI). Organizations need to move their thinking away from viewing data breaches as a onetime event and instead recognize that with every incident they are...