To fight threats, security practitioners need to develop a proactive, offensive risk quantification strategy to establish cyber resilience, says Shaik J. Ahmed, vice president of risk, governance and information security at Mashreq Bank.
"We came up with a structured, documented approach to respond to mitigating the Log4j vulnerability using the EDR scanning tools along with a code validation, containerization, and sandboxing of our applications and networks," says Ian Keller, security director at Ericsson.
The increasingly connected home is a vulnerable part of the extended enterprise, especially as the line blurs between personal life and work, says Forrester principal analyst Heidi Shey. She encourages organizations to adopt a two-pronged approach to protecting the "work from home" workforce.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...
As of Dec. 13, the U.K. is facing a "tidal wave" of infections from the COVID-19 Omicron variant, and case numbers are rising in North America as well. What do health experts know so far about the spread and severity of Omicron infections? Pandemic expert Regina Phelps shares insights.
No question, the COVID-19 pandemic has been devastating for healthcare professionals. But it also has brought new opportunities for IT and security leaders to exercise unprecedented influence on healthcare enablement. Anahi Santiago, CISO of ChristianaCare, discusses this enormous responsibility.
cloud migration, and the work from anywhere
model are opening up a world of possibilities
for organizations, pushing them to reinvent
core business models and unlock new revenue
On the other hand, from SolarWinds
to the recent Colonial Pipeline attack, it has
A risk-based approach to secure against digital fraud requires putting in the correct security controls in proportion to the organizational risk, which is determined by understanding the customer's subconscious habits, says Australia-based Tim Dalgleish, senior director, a global advisory, at BioCatch.
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?
COVID-19 deaths are down in some parts of the U.S., but infection rates are up. What does this mean as the nation kicks off its holiday season with Thanksgiving? Pandemic expert Regina Phelps shares insight on how to approach the holidays and what it will take to attain an endemic state.
A comprehensive IAM program requires integration with HR and legacy systems to enable multifactor authentication, SaaS, and Identity-as-a-Service to provide secure user access and a secure user experience, says Hong Kong-based Varun Kakkar, group head of cybersecurity at Tricor Group.
Four editors at ISMG discuss important cybersecurity issues, including law enforcement agencies' crackdown on ransomware operations, how banks are building their technology stacks to counter card fraud and whether the "work from anywhere" model is beneficial for employees in the long term.
CyberEdBoad excutive member Alan Ng of China Taiping Insurance, Singapore, explains the enterprise risk management strategy for the pandemic era and how the Distributed, Immutable and Ephemeral triad works with the Confidentiality, Integrity and Availability triad to make organizations more secure.
While doing digital transformation, CISOs tend to look more at technology and try to adapt it without making the distinction between technologies that are must-have and good to have. Krishnamurthy Rajesh of ICRA says CISOs must analyze risks, update security, and change the mindset of employees.