A critical element of managing third party risk seems obvious but is often lacking - knowing who your third-party partners are. Kelly White of RiskRecon discusses risk management best practices.
DNS is not well understood as a signal and control point in cybersecurity, says Andrew Wertkin of BlueCat Networks, who discusses key steps to change this perception.
Cryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew Hickey and Jennifer Arcuri outline its potential.
The Union Ministry of Home Affairs has informed the Finance Commission about its budgetary requirements for over INR 3.5 lakh crore for internal security between 2020-25, with a significant, but unspecified, portion to be allocated to cybersecurity.
The latest iteration of the NIST Cybersecurity Framework is designed to help bring those who aren't experts into the cybersecurity conversation, says Matthew Barrett of the National Institute of Standards and Technology. He outlines the expanded scope in version 1.1
What are the top cybersecurity threats and trends on security experts' radar? McAfee's Raj Samani and Steve Povolny discuss Olympic Destroyer malware, cryptocurrency mining, the Cambridge Analytica and Facebook scandal and more.
When visibility into systems is subpar, attackers gain an edge, says Michelle Cobb of Skybox Security, who offers insights on using the right technologies.
What two points do GDPR and other new regulations have in common? They put pressure on organizations to demonstrate strong security postures and mitigate third-party risk. Danny Rogers of Terbium Labs discusses how security leaders can respond.
What endpoint security practices yield the best results? Richard Henderson of Absolute Software describes how to use effectively use appropriate technologies.
Users are three times more likely to click on a phishing link on a mobile device than on a desktop computer, says Michael Covington of Wandera. How can this problem be solved?
Because network intrusions are inevitable, organizations need to improve detection to more quickly respond to attacks, says Carolyn Crandall of Attivo Networks. And deception technology can play a critical role, she says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.