Today, spam and anti-virus aren't enough to protect your organization-criminals have access to them as well. Attacks are now targeted,
expertly crafted and well funded. Download this infographic to understand the security risks of inbound and outbound email and solutions for these problems.
GovInfoSecurity announces its seventh annual list of top influencers - lawmakers, top government officials, practitioners and thought-leaders whose leadership has a substantial influence on government cybersecurity policy.
Reports on the Ukrainian energy supplier hack have left many crucial questions unanswered: Who was involved, did malware directly trigger a blackout and are other suppliers at risk from similar attacks? Cybersecurity experts offer potential answers.
What's it take to be a successful CISO? Mark Dill, former longtime information security director at the Cleveland Clinic, says it comes down to being patient, persistent and perceived as practical. He offers detailed career advice in this interview.
The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.
Data breaches are a big problem. In the US alone, 2015 data breaches exposed more than 175 million individuals' personally identifiable information (PII), payment card details, protected healthcare data (PHI) or other private information. Sadly, it's no longer a question of 'if you'll be breached', but rather 'when...
Effective information security and compliance not only requires a well-defined governance strategy, but also the ability to intelligently manage risk. Organizations need to put controls in place to identify issues and potential violations, restrict actions that can be taken with sensitive data, and log activity. ...
The cloud will be a growing part of your IT environment. This is inevitable, particularly in consideration of economics of the cloud and the opportunities in the Internet of Things. While information technology does move rapidly and with a degree of unpredictability, a comprehensive risk management approach, designed...
A power blackout that recently affected about 1.4 million Ukrainians has been tied to an espionage Trojan called BlackEnergy. The attack appears to be the first time that hackers have successfully used malware to help disrupt energy-generation systems.
Expect rebooted European Union data privacy rules to drive organizations worldwide to begin minimizing the amount of information they collect and store on individuals in 2016, both to protect privacy as well as minimize the impact of data breaches.
Boards of directors that figure out how to leverage cybersecurity as a strategic asset will give their organizations a strong competitive advantage, says Lance Hayden of Berkeley Research Group. "Security needs to be part of what the organization uses to competitively differentiate itself."
In an interview about evolving insurance fraud trends and solutions, Brian Banigan, IBM Global Marketing Leader, Insurance, discusses:
Today's top fraud threats;
What's wrong with many traditional counter-fraud solutions;
How IBM is helping customers improve fraud detection, investigation and resolution.
A key...
Many recent headlines have highlighted the fact that the traditional perimeter-based approach to network security has failed to adequately protect organizations, and that a new approach is needed.
Download this white paper to explore:
The traditional approach to network security, and why it can no longer...
In the absence of specific regulations for Web accessibility in the Americans with Disabilities Act (ADA), businesses are left without legal guidance on how to make their complex websites accessible. Some advocate for full compliance with WCAG 2.0 in all content while others argue that nothing is required at all.
...
Struggling to secure network access for a diverse user population? Concerned about how to match users with network access rights?
See how Cryptzone's AppGate solution provides automated, policy-based network security, and leverages user context - such as device posture, user location, and authentication strength -...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.