As cybercriminals continually evolve their tactics to gain access to systems and data, organizations must navigate the risks of increased vulnerabilities and stay vigilant against emerging cyber threats. It is no longer enough to think of cybersecurity as segmented pieces of a strategy.
In this webinar, we will...
As the Russia-Ukraine war continues, Ukrainian government cybersecurity official Victor Zhora says that the country's computer emergency response team has tracked more than 1,600 online attacks and that defensively, "wipers continue to be the biggest challenge."
Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.
Chaim Mazal, discusses the issues affecting CISOs, including how increased market share leads to increased problems and how having uniform, automated controls can provide security and enforce compliance.
EDR, MEDR, MDR, XDR - How does one begin to make sense of this alphabet soup that attempts to spell "detection and response?" Nirav Shah of Cisco discusses the merits of each of these options, as well as how one can start to make the decision on which is right for one's own organization.
Issues with passwords are legion: too many to remember; inherent security weaknesses, and inconvenience, but while many look forward to the day when passwords are no more, for now they are ubiquitous because they are useful, and one of the best ways to enhance their security is through the use of a password manager.
EDR deployments will be underway at more than half of federal civilian agencies by the end of September, according to federal officials. CISA is currently in the process of deploying EDR across 26 federal civilian agencies and expects to have work underway at 53 agencies by Sept. 30, 2022.
Managing risks begins with measuring risks. But how do you measure risks accurately? How do you share your findings in a meaningful way to both technical and non-technical audiences?
When measuring risk, the focus should be on what’s meaningful to your audience. And for the most important decisions about...
Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.1
Will this increase in spend result in a decrease in successful endpoint...
Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.1
Will this increase in spend result in a decrease in successful endpoint...
If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks."
To survive in today’s cyber threat landscape, security teams need the right resources paired with the appropriate strategy. Many organizations turn to managed security services (MSS) and managed detection and response (MDR) services, but many of the providers aren’t delivering the outcomes that clients had been...
Cyber attackers have become more innovative when targeting privileged accounts. Threat actors commonly target privileged endpoints such as that supporting Microsoft Windows, MacOS and Linux administrator accounts. Once attackers gain access to those privileged accounts, they can traverse the network and take over...
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.