Kubernetes has become the de facto operating system of the cloud. This rapid success is understandable, as Kubernetes makes it easy for developers to package their applications into portable microservices. However, Kubernetes can be challenging to operate. Teams often put off addressing security processes until they...
Security teams need to respond to new threats by adding new analytic capabilities to their SOC, giving them more insight into potential threats.
They need tools that allow security professionals to automate certain processes so they can focus on the real alerts -- that is, the real threats. It's time to build a...
Your machine data has a record of all of the activity that takes place across your infrastructure. It's become the single most valuable asset in the organization, as the secrets to mission optimization lie within the scores of microtransactions, including the ability to detect, investigate and respond to threats. And...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on July 27 a virtual cybersecurity summit for India on applying the model.
To mitigate cyberthreats, telecommunications companies in the GCC region need to enhance their incident detection and response capabilities, says Doha, Qatar-based Mustapha Huneyd, former global CISO of Ooredoo, a regional telecom firm.
Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that...
Establishing your SOC with the right technology, people, and process to protect your business from emerging threats can be a challenge for most security teams. Presenting multiple options to improve your efficiency of threat detection and response without adding headcount. This guide is designed to help you understand...
With increasing numbers of mobile users, branch offices,
data, and services located outside the protections of
traditional network security appliances, organizations
are struggling to keep pace and ensure the security, privacy,
and integrity of their networks and, more important, their
When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.
Nation-state attacks. SOC automation. Zero trust. Protection of critical infrastructure. These were some of the key themes that discussed at Information Security Media Group's recent Cybersecurity Summit in Delhi.
Since the $81 million Bangladesh Bank online heist in 2016, the nation's banks have made some progress in cybersecurity, but they still have a long way to go, says Prabeer Sarkar, CEO of Dhaka Distributions, a local cybersecurity company, who sizes up what work still needs to be done.
Mitsubishi Electric says hackers exploited a zero-day vulnerability in its anti-virus software, prior to the vendor patching the flaw, and potentially stole trade secrets and employee data. The Japanese multinational firm announced the breach more than six months after detecting it in June 2019.
ISMG and Cybereason visited Dallas on their "Indicators of Behavior" roundtable dinner tour. And Cybereason CSO Sam Curry says the discussion validated the notion that it's time to reimagine incident detection and response.