Credit rating agency Moody's Corp. warns that cyber defenses as well as breach detection, prevention and response will be higher priorities in its analysis of the creditworthiness of companies across all sectors, including healthcare and financial services.
As the unfolding investigation into the Paris attacks shows, just sharing threat-related data - without adding the crucial context that turns it into actionable intelligence - won't help organizations block attacks.
Gain insights from nearly 1000 IT Security professionals in more than 50 countries on today's vulnerability management programs. Get "in the trenches" information on challenges, satisfaction, and areas in need of improvement.
Download this report to learn about these key findings and the importance of:
Just as one massive breach fades from the headlines, it seems another one jumps to take its place. Now more than ever, it's critical for organizations to find ways to shrink their attack surface and get risk levels under control. But with ever-increasing network endpoints, a patchwork of security management resources,...
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
Today's threat landscape is exponentially more complicated than it was even a few years ago and will continue to diversify in methods and complexity going forward. Traditional, signature-based antivirus technology can no longer consistently remediate against the majority of them. Organizations must have a clear...
The continuous integration tools that many software developers rely on are often misconfigured or lack security controls, thus putting code at risk, security expert Nikhil Mittal claims at Black Hat Europe.
Whether seeking to block external attacks or curb internal abuse, security-conscious organizations increasingly are focusing
their efforts on protecting the true crown jewels: privileged identities.
Do you have confidence in your organization's ability to manage privileged identities and prevent their abuse? Can...
The annual Black Hat Europe conference launched on an introspective note, with security expert Haroon Meer using a best-selling book on individuals' workplace failures to argue that it's time for information security professionals to stop making excuses.
As cyberattacks become more sophisticated, organizations need to convert data into proactive threat intelligence, says Jim Penrose of Darktrace. In a video interview, he describes the concept of an "Enterprise Immune System."
Banks need to prepare for many more massive cyberattacks along the lines of the sophisticated campaign that hit JPMorgan Chase and other financial services organizations, says Javelin Strategy & Research's Al Pascual, who offers risk management insights.