This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
STOP THE BREACH: Reduce the Likelihood of an Attack Through an IAM Maturity Model.
Forrester estimates that 80% of security breaches involve privileged credentials.1
In December 2016, Centrify commissioned Forrester Consulting to evaluate identity and access management (IAM) practices and technology among large...
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
As a veteran security practitioner, Sam Curry of Cybereason is tired of the attackers having the advantage. He wants to see the tables turned, and he believes behavioral analytics just might be the technology to make it happen.
In the age of ransomware and business email compromises, email security has taken on new significance. And Zix, the email security provider, has rebranded itself to respond. Dave Wagner, Zix CEO, discusses the latest threats and defenses.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
This monthly Security Agenda will highlight some of the most recent additions to our course library. February's edition features Gartner analyst Avivah Litan discussing "Endpoint Detection and Behavioral Analytics." Other industry influencers like RSA's Principal Manager of Identity Protection, Angel Grant, Co-Founder...
Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action and tells why he believes the U.S. is in step one of a 12-step cybersecurity program.
While PCI DSS compliance is an important piece of the security checklist, it's not enough to protect retailers from sophisticated Cyber-attacks that fall outside of the cardholder data environment (CDE).
With more sales traffic over more channels than ever before, hackers have more opportunities to launch advanced...