Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
Many of the devices that go into so-called smart cities and buildings are not built to be secure, making it difficult for security operations centers to manage risk, warns Sarb Sembhi, CTO and CISO of Virtually Informed, who describes what needs to change.
An Iowa eye clinic and its affiliated surgery center recently recovered from a ransomware attack on their common systems within one day and without paying a ransom. This case offers important reminders to other healthcare entities and their vendors about advance planning.
We know that cybercriminals and even nation-states are taking advantage of the clues we leave behind in our digital footprints. How can investigators and researchers take advantage of this same open source intelligence? Former RAF investigator John Walker discusses the perils and promise of OSINT.
As internal communication becomes a top priority for companies as departments are no longer acting in silos, companies must look for new ways to drive internal efficiencies and improve workflows for their staff. Companies are moving past email to various unified comunication platforms, allowing staff to communicate on...
Implementing an end-to-end privileged access management solution should follow a defined process to
minimize costs and distractions, and speed results.
Throughout the process of selecting and deploying your privileged access management solution, keep in
mind these business requirements, as they will help you sell...
In the wake of a breach at Hong Kong's Cathay Pacific airlines that involved unauthorized access to personal details on 9.4 million passengers, security experts are weighing in on factors that might have contributed to the incident. So far, the airline has provided only sketchy details.
Facebook has been slammed with the maximum possible fine under U.K. law for "a very serious data incident" that exposed an estimated 87 million Facebook users' personal details to political campaign influence firm Cambridge Analytica.
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Download this Gartner Magic Quadrant to learn how SIEM enables users to:
Gain a single, comprehensive...
Although some global payment organizations apparently have failed to meet the Bank of India's October 15 deadline for storing all Indians' payment data domestically, the nation's central bank reportedly has ruled out extending the deadline and is demanding a status report.
Health insurer Anthem had earned HITRUST Common Security Framework certification before its mega-breach. Now that the insurer has agreed to a $16 million HIPAA settlement with federal regulators, who spelled out the company's security shortcomings, it's worth scrutinizing the value of adopting a framework.
VPNs were created for the networks and business environment of
yesterday but what worked 20 years ago cannot be trusted today.
Your VPN is cumbersome and time consuming from a management and
performance perspective. But what you might not want to concede
is that VPNs, by their very nature, pose a...
The latest edition of the ISMG Security Report features an analysis of the results of over 1,000 cyberattack investigations in the U.K. Also: an update on the proposed NIST privacy framework and a report on voter registration information for sale on the dark web.
CISOs and other security practitioners are embracing the idea of a business-driven security model that takes a risk-oriented approach, says Rohit Ghai, president of RSA. "Cybersecurity conversations are becoming business conversations rather than technology conversations."
Attackers are increasing their frequency and volume of
Distributed Denial-of-Service (DDoS) attacks. Companies are
facing increased pressures to strengthen their security. Three
forces contributing to the pressure are:
Stronger, more sophisticated, and highly motivated attackers.