Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
A "zero trust" framework can help organizations better define their access control strategies and ramp up authentication, says Vishal Salvi, global CISO and head of cybersecurity at Infosys Ltd., a multinational outsourcing company.
Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.
As global enterprises get their arms around supporting and securing a near-total remote workforce, their digital adversaries are adapting - and so is the role of deception technology. Carolyn Crandall of Attivo Networks discusses how deception can help mitigate new risks.
The UK Public Sector DNS Service is one of the NCSC's most widely deployed Active Cyber Defence capabilities across the public sector to date. The NCSC has partnered with Government Digital Services (GDS) and Nominet to provide the Protective DNS service.
Download this infographic for a statistical summary from...
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
Trend Micro researchers created a phony "smart factory" that lured attackers, demonstrating how they are increasingly focusing on industrial control systems and have become adept at planting malware within vulnerable infrastructure.
Deception technologies offer a way to shift away from a purely defensive "detect and response" posture toward a more proactive offensive approach that draws stealth cyberattackers into the open before a breach.
Deception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group.
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
Digitization across sectors has led to data proliferation, and organizations are struggling to handle the sheer volume of data. The abundance of valuable information has captured the attention of subversive elements, while cybercriminals have breached networks and compromised billions of records, not only causing...
Better network uptime?
Increased network speeds and data volumes require solutions that optimize performance and security. With inline bypass you select which mode tools operate in, so you can make intelligent decisions. A critical component of next-generation network packet brokers, inline bypass means just that:...