Blog Posts Tagged with "cybersecurity"
Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence
April 06, 2017 Added by:Larry Karisny
The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.
March 28, 2017 Added by:Kevin Magee
If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.
January 12, 2017 Added by:Nathan Wenzler
Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.
December 23, 2016 Added by:Mike Kail
With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.
December 15, 2016 Added by:Bernard Parsons
There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.
December 09, 2016 Added by:Michelle Johnson Cobb
Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.
December 02, 2016 Added by:Kasey Cross
Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.
July 27, 2016 Added by:Dan Lohrmann
The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.
June 03, 2016 Added by:Ajit Sancheti
Embracing new technologies that help intelligently automate parts of security to provide overwhelmed security teams a hand is a start. But in the long run, bigger changes to security strategies will need to take place. Everyone in a company needs to be responsible for security, not just the CISO.
December 18, 2015 Added by:Ilia Kolochenko
If you speak with management about money – speak their language and you will definitely get what you need.
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
December 01, 2015 Added by:Steve Durbin
Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.
November 10, 2015 Added by:Joe Weiss
2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
January 28, 2015 Added by:Anthony M. Freed
But the four cybersecurity legislation bills that were approved last month did not address all of the top concerns, namely the creation of an information-sharing platform that would enable better information exchange about cyber-based threats between the public and private sectors.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015