Cyber risk quantification (CRQ) is the measure of an organization’s cyber risk expressed in monetary terms, like dollars. CRQ has many benefits, but few security professionals understand how to implement it.
Join Paul Kelly, former head of risk at HSBC, and Chris Griffith, chief product officer at Balbix, as they...
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.
The discipline of security awareness training is chock-full of assumptions and misconceptions. As a side-effect, it is often felt that their programs are ineffective and...
Every industry has unique jargon and buzzwords, and cybersecurity is no different. The challenge faced by IT professionals across the globe is how to engage employees effectively in their role in making better online decisions. Breaking down the technical elements into non-technical elements is not as easy as you...
From SolarWinds to Kaseya, Accellion, Log4j and Okta, third-party security breaches are among the most devastating for organizations affected. Tony Morbin of ISMG dives into the story behind the results of a global survey with Demi Ben-Ari, the co-founder, CTO and head of security at Panorays.
Supply chain compromise attacks cost an average of $183,000. You should be prepared.
In this white paper from Dr. Eric Cole at Secure Anchor, learn how attackers leverage compromised accounts from vendors or partners to launch attacks that are specifically designed to bypass traditional email security. These...
This compendium brings together Gigamon's thought
leadership work in collaboration with Information Security
Media Group between during H1 2022. Gigamon's resources
include two fireside chat webinars, two panel interview
videocasts & eBooks, plus a field research survey, expert
analysis and report of results....
Cloud collaboration suites like Microsoft 365 are critical to business success, but have become significant entry points for potential exploitation. Just as your team relies on email and collaboration tools to accomplish their goals, so too do sophisticated threat actors. And while the built-in security of Microsoft...
From a business perspective, Robotic Process Automation (RPA) promises to be a fast route to increased efficiency, productivity, and quality. Organizations are rapidly adopting RPA to automate business processes, from finance and HR to manufacturing and customer service. From a cybersecurity perspective, RPA also...
Increasingly, executives are asking their security teams to secure all application secrets – everywhere across their entire organization. A potentially daunting task.
Where do security teams begin? This eBook outlines a practical systematic approach and blueprint for organizations to take to enhance the security...
Employees are leaving at an unprecedented rate. As a result, the Great Resignation has created more opportunities for data loss than ever before. According to the 2022 Voice of the CISO report, CISOs agree that protecting data has become an increased challenge. So, how do you protect your organization against data...
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
Many people enter the cybersecurity field with foundational skills, such as knowledge gleaned from college courses, and giving them "practical skills, to be ready go out on the job floor and be ready to do something - that takes a little bit of something extra," says ITProTV co-founder Don Pezet.
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020’s scramble to enable remote working fading from memory, securing hybrid setups in the long term presented a new and complex challenge.
At the same time, cybercrime went prime time. High-profile cyber-attacks...
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
Now more than ever, chief information security officers (CISOs) are expected to weigh in on board-level decisions. In an increasingly competitive landscape, business acumen has become just as important as technical know-how, and executives rely on the CISO to map security programs to business objectives to promote...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.