It's a tried and true military tradition: ISR, or Intelligence, Surveillance and Reconnaissance. But the practice is gaining traction in enterprises as well, and especially within cybersecurity, says Christopher Cleary of Tenable Network Security.
What is the compelling need for Cyber ISR?
"The concept of...
HHS has issued a checklist and other materials to aid healthcare organizations and their vendors in their "quick response" to cyberattacks. The move comes as Congress scrutinizes HHS' efforts to help the healthcare sector improve its cybersecurity capabilities.
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
Former FBI Director James Comey trickled out new details during a Senate Intelligence Committee hearing about what the FBI knew and when regarding Russia's alleged cyber intrusions. We've rounded up the details.
A discussion that explores the predicament many information security managers face when deciding which security technologies to buy in a glutted market leads the latest edition of the ISMG Security Report. Also: An update on cyber flaws in connected vehicles and the latest from Infosecurity Europe.
The two primary teams responsible for blocking security breaches in organizations have different priorities, timelines, and objectives. However, businesses are starting to take a new approach to bridge the gap between security and operations teams, and ensure that systems are running and secure.
SecOps is the...
Russian anti-virus vendor Kaspersky Lab has filed two antitrust complaints against Microsoft in Europe, contending that the company has engineered Windows 10 to favor its preinstalled malware-fighting program, Windows Defender.
Intelligence agencies, governments, military and defense agencies, law enforcement, and commercial enterprises worldwide need to utilize a proactive, intelligence-driven offense to prevent and disrupt today's sophisticated threats.
Cyber threats vary greatly, and so do the methods of attack. To counter various...
In the wake of the London Bridge attacks, Stella Rimington opened the Infosecurity Europe conference in London with lessons learned from her tenure as director general of Britain's domestic security service, MI5.
A discussion analyzing the difficulty of striking a balance between IT functionality and cybersecurity leads the latest edition of the ISMG Security Report. Also featured: Updates on sizing up weaknesses in biometrics and the potential to exploit LED lights to leak sensitive data from routers.
The WannaCry Ransomware is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally.
Download this eBook to learn how to be prepared to quickly address the growing threat of ransomware and limit your company's exposure to future...
In February 2016, hackers reportedly attempted to steal approximately 1 billion USD from the Central Bank of Bangladesh by exploiting weaknesses in the bank's security to infiltrate its system and gain access to computers with access to the SWIFT network. In February 2017, several Polish banks were...
Flaws in Subaru's telematics software, discovered by a security researcher, could have been exploited to unlock the doors or provide remote access to a car's location history. The problems - now fixed by Subaru - underscore carmakers' ongoing cybersecurity challenges.
Outdated policies, lax regulatory oversight and bureaucracy have stunted more advanced cybersecurity investments at some organizations that provide the nation's critical infrastructure, says Brian Harrell, the former director of critical infrastructure protection at the North American Electric Reliability Corp.
By some estimates, 70 percent of enterprise data still resides on the mainframe. That means mainframe security needs to be a hot-button cybersecurity issue, says Chip Mason of CA Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.