Enterprise intelligence combines human-led analysis and computer-driven analytics to provide actionable insights for your enterprise, so you can disrupt and neutralize threats.
Download this infographic and learn:
How often insider misuse is responsible for security incidents;
The average cost of a single data...
We all see the heightened global tensions with Russia, North Korea and China. But what's happening below the surface, where cyberattacks originate? Tom Kellermann of Strategic Cyber Ventures shares insight on the shifting threat landscape - and how the U.S. must re-think its response.
The head of the U.S. Securities and Exchange Commission says publicly traded businesses must better describe their cybersecurity risks to investors. Wall Street's top regulator also warned of a surge in initial coin offering scams - the same week that China banned ICOs altogether.
Increased digitisation and adoption of digital banking channels have led to a sharp increase in incidents of mobile fraud, enhancing the challenges for the CISOs in securing these transactions, says Subhash Subramaniam, CISO of ICICI Bank.
A massive Locky ransomware campaign has been infecting devices via malware-laced spam messages as well as through fake Dropbox phishing pages. More than 23 million Locky spam email have been seen in just one 24-hour period.
A sloppy spamming operation has exposed on a server in the Netherlands a batch of files that includes more than 700 million email addresses and some associated account passwords. It's perhaps the largest batch of email addresses ever found in one spot.
Password security guidance: Do block users from picking commonly used passwords. But to avoid a usability nightmare, don't block users from picking any password that's ever been seen in a data breach, security experts advise.
Security practitioners need to look at security from a business risk perspective and protect what matters most to the organization, says Rajnish Gupta, RSA's country head, India and SAARC, who explains how business-driven security works.
Organizations in all sectors "need to look at the CISO role as an executive position with holistic understanding and a more well-rounded background" to help ensure security goals align with business goals, says consultant Ed Amoroso, former AT&T chief security officer.
As CISO at Hearst Corp., David Hahn's security strategy must be mindful of the challenges and brand risks for well-known media properties, including ESPN and Esquire, as well as smaller, lesser-known units within the corporation. Each requires a risk management strategy.
A list of weak credentials for vulnerable Internet of Things devices has prompted a new effort to notify their owners. The fear is of another mass, IoT-fueled DDoS attack along the lines of last year's Mirai attacks.
Organizations need to adopt a "threat hunting" approach to managing risk, striving for early detection of anomalies, says Anuj Tewari, CISO at HCL Technologies, an India-based multinational IT service company