Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments.
How can deception technology offer a new alternative?
The key to deception technology is to deter lateral movement inside a network. On...
Are you interested in how your peers are dealing with increased breaches, vulnerabilities and encrypted traffic?
Download this report and learn:
How to reduce incident response times and dependency on skilled security personnel;
Key insights into the cyberthreat landscape;
How other security pros are protecting...
Cybercriminals are organized, well funded, and highly motivated. They are deploying advanced malware, leveraging cloud-based computing resources, and developing cutting edge tools to attack your organization's data.security defenses.
The proliferation of online devices accessing personal and financial information,...
Cloud providers have transformed from offering a fringe platform utilized by courageous companies on technology's leading edge into a cloud-first, standard, go-to approach for running all sorts of business-critical systems. According to IDC, nearly 50% of IT infrastructure spend will be on private/public clouds by...
At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.
Organizations have been victimized by a wide range of threats and exploits, most notably phishing attacks that have penetrated corporate defenses through targeted email attacks launched from compromised accounts, as well as sensitive or confidential information that accidentally was leaked through email.
A survey...
At its core, compliance is about behavior. It's about whether your users utilize protected data sets in an appropriate manner. While most organizations focus on the establishing and assessment of the security controls around access, the true test of compliance revolves around having visibility into what users do with...
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
At the first of two Congressional hearings this week, Facebook CEO Mark Zuckerberg on Tuesday faced questions from Republicans and Democrats alike about whether the government should more closely regulate his firm and others.
When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.
Facebook CEO Mark Zuckerberg informally met with U.S. lawmakers on Monday ahead of two congressional hearings, where he is expected to face a bruising examination. One senator was blunt with Zuckerberg, contending that on data privacy "Facebook failed us."
KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing the KnowBe4 Security Awareness Training and Simulated Phishing Platform.
The resulting research paper assesses the performance of the...
Over 200,000 Cisco network switches worldwide reportedly were hacked Friday, apparently affecting critical infrastructure of large internet service providers and data centers across the world, especially in Iran, Russia, the United States, China, Europe and India. What remediation steps should be taken?
In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.
One of the most important priorities for a CISO is having a place at the table with the board of executives, says John Petrie of NTT Security. "It's very helpful to have interaction with the board so when things like budgeting or things like how you're going to change your programming come up, they are attuned to what...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.