Contrary to common assumption, "advanced malware" is not a singular type of superior malicious code or harmful object that can that compromises systems, harvests data or damages corporate networks. Rather, this term describes sophisticated behavior and evasion capabilities that certain strands of malware possess which...
The latest edition of the ISMG Security Report leads with a closer look at a new exploit kit and whether it represents a resurgence in these types of criminal packages. Also featured: a discussion of new vehicle security concerns and communications advice for CISOs.
Communication consultant Michael Santarcangelo outlines three key questions CISOs should ask at the outset of any project to convey security's value and clearly set expectations
It can be incredibly disruptive and time-consuming to add new security technologies to your network. However, it is vital to continue to advance your organization's ability to detect and respond to advanced malware - especially malware that evades other "advanced" security tools like sandboxes and...
It's tough to find the right cybersecurity professionals to hire. Ben Chung, CISO at NTT Communications ICT Solutions, a global IT provider, describes how he narrows down candidates.
The biggest companies often take matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, smaller companies fall further behind, struggling to find talent and budget, while security...
The 2017 RSA Conference Asia Pacific & Japan, to be held July 26-28 in Singapore, will offer a security road map, imparting lessons to practitioners to help them navigate through cybersecurity complexities. Here's a preview of some of the top sessions.
A former Qualys customer for more than a decade, Mark Butler is now the company's CISO. And one of his jobs is to help spread the word to other security leaders about the vendor's vulnerability management solutions.
It's not enough to comply with government and industry regulations such as SOX, PCI, MICS, and HIPAA. Organizations must also prove their compliance to auditors on a regular basis. Even companies not bound by regulatory requirements may need to confirm their adherence to internal IT security policies.
But...
The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
MeitY is requiring every government department in India to appoint a senior staff member as CISO. But some security experts question whether there are enough qualified security experts in all government departments to fill the new CISO positions and suggest departments consider hiring outside experts.
The biggest companies (the Fortune 500 types) are more often than not taking matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, the "unfortunate" 5,000 and beyond fall further...
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
A lack of computer security professionals in Australia made recruiting difficult. But new changes to immigration rules may really pinch the country's nascent cybersecurity industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.