By applying analytics to user behavior, organizations can better prioritize the actual risks facing their business, thus helping cut through the sheer volume of security alerts they face daily, says Doug Copley, deputy CISO of Forcepoint.
The honeymoon period for smaller players in cybersecurity is nearing an end, predicts Trend Micro CTO Raimund Genes. Achieving profitability has proven to be challenging for startups, while more established companies are thriving, he contends.
Megaupload Founder Kim Dotcom plans to appeal a New Zealand High Court ruling that found him and three colleagues eligible for extradition to the U.S. The four men are charged with profiting by allowing the trade of copyright-protected content on their file-sharing platform.
Responding to disruptive data breaches, dealing with Mirai botnets, hacking back and the need for enterprises to segment their backup environments were just some of the topics dominating this year's RSA Conference in San Francisco.
Amidst the increasing security chaos facing individuals and organizations, one of the dominant themes at this year's RSA Conference was the need for information security professionals to do more, bringing order to enterprise IT security as well as by influencing public policy.
Chris Pierson of Viewpost offers an assessment of the impact the Trump administration could have on cybersecurity in the government and private sectors and sizes up the role of emerging technologies.
This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
Hackers gained unauthorized access to information on the website of India's Ministry of Home Affairs on February 12, prompting authorities to temporarily block it. But is the government well-equipped to prevent other such attacks?
The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012. Rich Bolstridge of Akamai Technologies tells how the definition of "adequate cybersecurity" has also shifted.
Europe's GDPR has business leaders everywhere talking about privacy. But are they having the right conversations? Michelle Dennedy, chief privacy officer at Cisco, offers her perspective.
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
Entities across all industry sectors appreciate the need for ensuring secure relationships with their third-party service providers. Jasson Casey of SecurityScorecard discusses new solutions for achieving those secure relationships.
Vishal Salvi is a security leader who has worked in business, left to be a consultant, and now returned to business again. What new perspectives does he bring to his role as CISO at IT services firm Infosys?
As RSA Conference 2017 winds down and Information Security Media Group's series of exclusive video interviews wrap up, editors Tracy Kitten and Tom Field share their key takeaways from perhaps the busiest day of the event.
As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer of Bitsight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.