While other corporate functions have embraced benchmarking, risk and security teams have been left in the dark. Existing tools for network security are unable to compare security performance against industry averages and peers. To effectively understand the impact of security programs and communicate changes to key...
Out-dated AV security, lack of innovation, defeatism, communication breakdowns with IT - little wonder that boards are missing out on the solutions that will protect their organisations from the huge increase in cyber threats.
The devastating consequences of cyber-attacks are now making information security one of...
There is no doubt that every organization now requires advanced malware protection. Even so, there are plenty of organizations that have either not yet implemented this protection, or have it only somewhat implemented. Do these organizations recklessly believe they won't be targeted? Do they think their investment in...
For public sector technology leaders evaluating technologies to combat malware attacks, this report offers important considerations for deploying cloud-based security.
Ransomware and other data security threats are a serious concern for any organization, but the stakes are higher and the risks are greater for...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
How can organizations decide what security technologies best meet their needs? CISO Mark Eggleston shares his tips for making the right purchase decisions.
Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region due to an explosion in its information and communications technology infrastructure, and this is changing the risk profile.
when addressing the advanced capabilities required to...
As internet of things devices become increasingly common in the enterprise, CISOs must lead the way in making sure emerging security issues, including a higher risk of distributed denial-of-service attacks, are adequately addressed, says John Pescatore of the SANS Institute, which offers training for CISOs and others.
For organizations that are embracing cloud and virtualized environments, three common-sense steps are proving to be key for providing the visibility and control needed to maximize security across modern IT environments.
Download this eBook to learn how you can implement these steps in your organization.
VMware...
Information security and risk management teams are frequently asked to update their Board of Directors with the cybersecurity posture of both their company and their vendors. Gartner estimates that by 2020, 75% of Fortune 500 companies will treat vendor risk management as a Board-level initiative to mitigate brand and...
After suffering one of the worst data breaches in history, in which 145.5 million U.S. consumers' personal details were stolen, credit bureau Equifax has hired Jamil Farshchi to serve as its new CISO. Farshchi joins from Home Depot, which hired him after suffering a massive data breach.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
As the healthcare sector implements a variety of new applications and increasingly moves to the cloud, it has a fresh opportunity to address security, says Daniel Bowden, CISO at Sentara Healthcare, who discusses best practices.
This episode of the ISMG Security Report is devoted to producer/host Eric Chabrow's recollection of the evolution of cybersecurity news and analysis during his nine years at Information Security Media Group. Chabrow is retiring after 45 years in journalism.
Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.