One of the biggest challenges in stopping data breaches lies in sifting through vast amounts of data to find the proverbial "needle in the haystack" - the subtle clues that indicate an attack is imminent or underway in your organization. As modern computer systems generate billions of events daily, the amount of data...
T-Mobile has suffered a breach that may have exposed personal data for 2.3 million of its 77 million customers, and one security researcher says the hacker appears to be keen to sell the stolen data.
How is risk management evolving as a result of ubiquitous cybersecurity risks? Jennifer Bayuk, CEO of Decision Framework Systems, provides an overview.
In many organizations, overworked security analysts are trailing the bad guys in technology and knowledge, and this gap leads to increased risk, says Jeff Michael of Lastline.
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency.
However, security teams are still struggling to maintain security visibility of dynamic, IaaS computing environments due to decentralization of IT, the expanding cloud attack surface,...
Cloud service adoption has led to increased flexibility, greater efficiency, improved networking and vast scalability. But cloud sprawl continues to expand cloud attack surface.
Decentralization of IT and cloud service misconfigurations are creating risk and adding to the complexity of security.
Download this...
Security thought leaders have long called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a "wartime" mindset. Aetna CSO Jim Routh now says it's time for enterprises to shift from conventional to unconventional security controls.
A website that appeared to be part of a phishing campaign designed to gain access to the Democratic National Committee's voter database has turned out to be part of an uncoordinated security exercise. The false alarm has highlighted the benefit of actively monitoring for election interference.
Timing incident response actions correctly helps with rapid remediation and enables taking full control of the environment, says Mandiant's Steven D'sa.
Leading the latest edition of the ISMG Security Report: An analysis of why it may be too late to secure the 2018 U.S. midterm elections. Also: A close look at the Anthem breach lawsuit settlement and a report on ransomware recovery lessons learned.
Although the government has been slower than the private sector to adopt the cloud, there's no doubt that the shift is underway. IDC says "Cloud First" will become the new mantra for enterprise IT, noting that the major innovations taking place in IT today are not possible without the cloud as a foundation.
By...
Traditional server security controls were not built for
ransomware, cryptojacking and other modern attacks.
Things such as deep learning, antiexploit
technology and other key elements of the new
wave of server defenses are discussed in this whitepaper.
Download this whitepaper to learn more about:
The evolution...
Companies taking advantage of public cloud infrastructure often create and maintain many AWS accounts.
If you are hosting applications in AWS, security is a shared responsibility between you and AWS.
While AWS manages the security "of" the cloud, you are responsible for the security of your applications and data...
Many organizations don't have a full grasp of their digital footprints, which attackers analyze closely when plotting intrusions, says Hans Barre of RiskIQ.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.