The challenge of wanted to adopt the latest and greatest point products, as opposed to opting for a more platform-based approach, seems never-ending, and can only be managed by bringing greater amounts of automation to bear, says Skybox Security's Michelle Cobb.
Life after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able to rapidly respond to the next big cyberattack against Europe. But with warnings of ongoing Russian election interference campaigns, the next big attack may already be underway.
Federal regulators and medical device maker Medtronic have issued new warnings about cybersecurity vulnerabilities in certain cardiac devices from the manufacturer that could potentially allow attackers to manipulate the products' functionality, posing safety risks to patients.
What is the role of professional certification companies in the cybersecurity education ecosystem? In part one of a two-part panel discussion on the future of cybersecurity education, John McCumber of (ISC)2 and Rob Clyde of ISACA share their philosophies.
What are America's universities doing to help fill the cybersecurity skills gap felt by enterprises worldwide? In part two of a two-part panel discussion on the future of cybersecurity education, Lisa Ho of the University of California-Berkeley and Amit Elazari Bar On of Intel Corp. offer insights.
Forget inside/outside the perimeter when mitigating
risks. That's the notion behind "zero trust," which means
applying risk-based controls to safeguard access.
Download this whitepaper to learn more about:
Cloud service attack trends;
Best practices for mitigating risks;
How to make the concept of "zero trust"...
Aluminum giant Norsk Hydro has been hit by LockerGoga ransomware, which was apparently distributed to endpoints by hackers using the company's own Active Directory services against it. To help safeguard others, security experts have called on Hydro to release precise details of how it was hit.
In today's hyper-connected enterprise, organizations are at risk of two different types of attack. Larry Link, CEO of Cequence Security, explains how to defend at a platform level - without adding friction.
Is your security team blind to the activities in more than half of its IT assets? That was just one of the findings in a new report from 451 Research, based on in-depth interviews with security leaders across 150 large enterprises and focused on the challenges facing their teams. On average, the report found SIEMs...
With 96% of businesses now relying on cloud computing,
including 81% that use multiple cloud environments*, cloud
adoption is no longer a trend but the new normal.
This requires enterprises to place more emphasis on a critical
issue related to cloud computing and storage: how to ensure the
The problem: growing adoption of interconnected technologies is stretching capabilities of existing public key infrasructures (PKIs) and driving the need to stand-up new ones.
The challenge here is maintaining a strong root of trust across the enterprise PKI that fulfills the operational demands of more...
Web hosting firm XBT/Webzilla's infrastructure was used to attack the U.S. Democratic Party and for 2016 election interference, a former National Security Council official said in a court report filed as part of a since-dismissed defamation lawsuit over the Steele dossier's release.
Retired Lt. Gen, Rajesh Pant apparently will be India's next national cybersecurity coordinator, government sources say. Dr. Gulshan Rai, India's first cybersecurity chief, confirms he'll be stepping down at the end of his four-year term.
Broadcom acquired CA. AlienVault became AT&T Cybersecurity. These are just two of the deals that headlined in 2018. What does the 2019 market hold? Brad Topchick, managing director of Mooreland Partners, shares insights.