In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses
and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board members to ensure they...
Today's business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. The constantly changing "risk landscape" is a discussion point in headlines, industry forums, media outlets and board rooms - the disappearing perimeter to defend, the hackers, thieves...
Every organizational unit has some level of risk it must address. Yet, most internal teams lack the ability to identify priorities and accountability to stay ahead of new threats to the business thus leaving the process of managing risk to be more reactive. While many risks exist within each function, there is often...
In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses
and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board members to ensure they...
In the past, the only discussions people had about email were focused on the never-ending inbox and the amount of time wasted filtering through it. The Snowden revelations changed all that. Suddenly, every mainstream media outlet was covering email and its lack of security. Companies reconsidered how they sent...
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
Just when you thought it was safe to go mobile, everything is different.
The risks are different. Only a few years ago, predictions stated that smartphones and tablets had little vulnerability to malware and hacking. But in the one-year period ending March 2013, malware aimed at mobile platforms grew 614 percent,...
Combatting advanced cyberthreats grows more challenging every day. With up to a third of enterprise Internet traffic now being encrypted, cybercriminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits. But even if all...
Network encryption is a security best practice as it protects the privacy and confidentiality of network traffic as it travels from source to destination. While this can be beneficial, security professionals understand that network encryption can also be used for malicious purposes. Cyber-criminals and hackers can...
The cloud and mobility are disrupting the way IT builds and delivers value for organizations. Perhaps you are moving computing workloads to the cloud and storing an increasing amount of data outside the corporate perimeter, or maybe an increasing proportion of employees now access data from outside your corporate...
The proliferation of smart devices has created a new breed of informed, always-connected shoppers, who demand real choice when it comes to selecting and purchasing goods. At the same time, breaches of sensitive information are announced almost weekly and retailers struggle to balance customer service and critical...
Financial services organizations are primary targets for increasingly sophisticated - and numerous - security attacks. In fact, a 2012 Ponemon Institute study revealed that 64 percent of US retail banks surveyed experienced a distributed denial of service (DDoS) attack during the previous 12 months. In September 2012...
Breaches happen. In today's high-value, high-stakes enterprise environments, many organizations rightly assume not only that their data and computing systems will be attacked, but that a certain number of attacks will succeed.
But recognizing the problem is only the first step - because the corollary to the...
The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today's security problems. Security needs to process a broader and richer data set including network and big data...
Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be that attackers and their dirty work have virtually no time at all. But in reality, many organizations give attackers all...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.