Organizations looking to migrate to a next-generation security operations center must first carefully assess any problems they are facing with current security technology, says Vikram Mehta, associate director of information security at MakeMyTrip, an India-based online ticketing portal.
Hundreds of members of the German parliament, Chancellor Angela Merkel as well as numerous local celebrities have had their personal details and communications stolen and leaked online as part of what authorities are calling an attack on the country's democracy and institutions.
In this edition of the ISMG Security Report, former federal CISO Gregory Touhill explains why a zero-trust security model is essential, and Ron Ross of NIST describes initiatives to protect critical infrastructure from IoT vulnerabilities.
Attackers are holding data for ransom because they know you can't do business without it.They're establishing a beachhead on the Internet of Things (IoT) because it's everywhere. They're weaponizing artificial intelligence (AI) because they intend to outsmart defenses.
Today, in fact, even the most...
Advanced threats have matured, they're taking advantage of multiple attack points in your systems and networks, they're hijacking users' credentials at a low and slow pace, and they're off your radar, but always ready to strike.
Threats have advanced in size and sophistication. Grab this infographic to start...
IT security teams have to protect their organizations from cyber attackers while also addressing internal and regulatory compliance requirements, such as ISO 27001, PCI DSS or GDPR. This is no small task. If you're relying on a basic log manager or rudimentary spreadsheets to store and search through logs, chances...
Encrypting and decrypting traffic consumes a lot of computational power, so many security inspection solutions either don't decrypt at all or take such a huge performance hit that they pass along encrypted traffic just to keep up. Whether its traffic coming into your application or internal traffic going out to the...
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications.
However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your...
The benefits offered by TLS 1.3 are substantial, but more comprehensive encryption also makes it tougher to spot malicious traffic and defend against attacks hidden in that encrypted traffic. You may need to take a new approach to get the visibility you need while simultaneously preserving your performance gain...
It's good to be legal, according to Brett Johnson, formerly America's most wanted cybercriminal, as he reflects on a year of his experiences speaking at ISMG Summits.
"Self-sovereign identity" projects based on blockchain technology are likely to gain significant momentum in 2019, says analyst Avivah Litan of Gartner Research.
Production of newspapers owned by Chicago-based Tribune Publishing was disrupted after malware began infecting the company's publishing and printing systems. Tribune newspapers report that they appear to have been hit by crypto-locking Ryuk ransomware.
Mastercard has launched a "fusion center" designed to increase its speed of response and coordination among departments in the event of a cyberattack, says CSO Ron Green, who explains the initiative.
Personal information for 1,000 North Korean defectors, including their names and addresses, has been stolen via a malware attack, officials in South Korea warn. They've traced the leak to a malware infection at a refugee resettlement center, and say police continue to investigate.
In the wake of Equifax and other major breaches, sophisticated fraudsters are finding success as never before. Al Pascual of Javelin Strategy and Research discusses how identity impersonation is manifesting.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.