Advanced endpoint protection (AEP) shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and is in a constant state of flux.
Assessing new technologies is no small undertaking and analysts must often rely on comparing limited information from less-than-ideal...
CISOs and security analysts alike complain that security information and event management (SIEM) technology has not fully lived up to its promises. Even with SIEM systems in place, enterprises still suffer from alert fatigue, and security teams armed with SIEM event and flow data still miss untold numbers of attack...
Our objective, as the industry's largest global media organization, is to bring you the most important bits from the conference, whether you attended the event or are experiencing the content now for the first time. Call this the Best of RSA Conference 2017.
What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs.
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
New ransomware circulating via BitTorrent is disguised as software that purports to allow Mac users to crack popular Adobe and Microsoft applications. Separately, new ransomware calling itself Trump Locker appears to be the previously spotted VenusLocker ransomware in disguise.
Many organizations are facing a reality where their security investments have been focused on-prem but their users, devices, or apps are moving off-prem. A common question we hear from CISOs is: "How do we determine when it's time to extend our security to the cloud?" We don't pretend there's an answer for every...
Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. These actions range anywhere on the continuum from ignorance to malicious....
Of the hundreds of CISOs we work with, there isn't one who doesn't know that as cloud adoption increases, the maturity of cloud security must also increase (unless of course you don't have any sensitive data or your risk tolerance is very high). But, before investing in the latest and greatest tools, we always...
Could attitudes about cybersecurity in the healthcare sector be at a tipping point? A new study shows a shift from a focus on compliance to managing business risks, says David Finn, health IT officer at Symantec.
Organizations across sectors have come to understand the inherent security risks posed by third-party vendors. But too many approach vendor risk management with a manual process, says Daniel de Juan of Rsam.
Federal regulators are considering the role that blockchain technology could play in advancing the secure exchange of healthcare information, says Steve Posnack of the Office of the National Coordinator for Health IT, who explains ongoing research efforts.
Every year, information security professionals flock to San Francisco for the annual RSA Conference. From the debut of "Trumpcryption" to cybersecurity's "greatest hits" set to hip-hop violin, here are some of the 2017 event's highlights.
Malware tactics have evolved to incorporate a wide range of capabilities that enable cybercriminals to bypass static endpoint protection systems, initiate authenticated online banking sessions, and illicitly transfer money-often without either the customer's or the bank's knowledge. As financial organizations launch...
Old-school cybersecurity approach has proven to be futile, and many organizations and high-profile events-including the recently convened G20 Summit-are opting for the new approach because of the vulnerabilities that have been exposed by recent, high-profile attacks.
Advanced threats are multilayered and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.