Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
The U.S. government shutdown is impacting agencies integral to the nation's cybersecurity readiness, and experts fear its long-term impact on the country's cyberattack response capabilities, as well as the risk that it will drive away desperately needed new cybersecurity talent from entering public service.
Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: "Assume Breach".
Join Roger A. Grimes, a 30-year computer security consultant and author of 10 books, for this webinar where he explores the latest research...
In an increasingly complex world of interconnected information systems and devices, more must be done to protect critical infrastructure, says Ron Ross of the National Institute of Standards and Technology.
A business disruption caused by cyberattacks corrupting your critical data and configurations of your systems can be as damaging to an organization's financial well-being and reputation as data theft or a complete IT outage.
This can be especially true when cyberattacks involve data encryption or malware...
If your organization is about to
embark on an M&A process, brace
yourselves: your vulnerability to
attack is about to go up, and
cyber-criminals are likely to be
doubling their efforts to capitalize
on this window of opportunity.
Download this whitepaper to learn more about:
How M&A is an opportunity for...
For nearly 30 months, internet traffic going to Australian Department of Defense websites flowed through China Telecom data centers, an odd and suspicious path. Why the strange routing occurred is known. But the reasons why it persisted for so long aren't.
The United States will soon officially have a single agency that takes the lead role for cybersecurity. Congress has passed legislation to establish the Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security. The measure awaits President Trump's signature.
CrowdStrike® Falcon Discover™ on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more.
Watch this on-demand webinar. You'll see how CrowdStrike Falcon Discover can help your security...
Google is investigating an unorthodox routing of internet traffic that on Monday sent traffic bound for its cloud services instead to internet service providers in Nigeria, Russia and China. Security experts say border gateway protocol is to blame and no easy fix is in sight.
The security operations center (SOC) faces mountain challenges: lack of personnel, disparate security tools, multiple alerts that must be run down, prioritization of alerts and the transition between incident detection and incident response.
Security affects and is affected by operational and IT considerations....
One of the biggest challenges facing IT ops in agencies today is the lack of visibility across the entire infrastructure.
Download this report by Gartner to learn the four-step approach to developing an IT operations monitoring strategy.
As the modern attack surface rapidly expands, companies must get the basics right. Yet each time a data security breach hits the news, there are reactionary questions are what could have been done to avoid the problem. More often than not these incidents occur because organizations commonly overlook basic security...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. In fact,
the perimeter has mostly disappeared. We are living in a new reality, one crowded with new types of dynamic IT assets.
Whether
it's discovering short-lived assets like containers, assessing the state of cloud...
Georgia quietly fixed two flaws in its voter registration website that could have exposed personal information. How the secretary of state's office discovered the flaws and reacted suggests it may have erred when making a sensational accusation against the Democrats on the eve of the U.S. midterm elections.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.