The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel. The breach alert follows a recent GAO report warning of serious cybersecurity shortcomings in U.S. weapon systems.
Rapid increase in the frequency and sophistication of cyberattacks, adoption of new technologies and ever evolving regulatory requirements, continue to heighten security demands on organizations of all types. And many organizations are finding it difficult to create and maintain a robust cybersecurity program given...
Organizations are increasing their security budgets, yet security struggles persist. Enterprise security teams are struggling to adapt skill sets, tools and controls at the pace of digital transformation happening in their organizations.
Download this infographic and know more about:
The key drivers for...
Machine learning could be a breakthrough for data classification, addressing fundamental challenges and paving the way to create and enforce automated policies that can be scaled across the enterprise, says Titus CEO Jim Barkdoll.
As attackers become more adept at evading "reactive" security controls and alert mechanisms, proactively analyzing the behaviors of people and systems is critical to detecting malicious activity, says Gartner's Kelly Kavanagh.
Seeking better operational efficiency and ROI, many enterprises have begun significant software automation and orchestration efforts without accounting for the inherent security risks they may bring, says Jeffery Kok of CyberArk.
Researchers say hackers are increasingly using Indian government websites to mine cryptocurrencies. Security experts urge government authorities to take steps to mitigate the risks of cryptojacking, which can cause performance problems.
Open source and third-party components help developers build and deploy applications faster. But with increased speed comes greater risks, says Chris Eng of CA Veracode, who offers insights on mitigating those risks.
In addition to its use for improving cloud security, cloud access security broker software can play a role in managing shadow IT and controlling sanctioned IT, says Satyavathi Divadari, director of cybersecurity at Cognizant Technology Solutions.
With the rapid adoption of cloud services like Office365, Salesforce, Workday, AWS and Azure, organizations in all industries, and of all sizes find themselves on 'cloud first', and some even 'cloud only' journeys. With the right shared responsibility controls, many organizations believe these advancing cloud models...
Effective "SecOps" involves revamping security processes that are inconsistent and ad hoc to make them targeted and consistent, says Rapid7 CEO Corey Thomas, who describes the roles of automation and orchestration.
The issue of access management and vulnerable software applications has come back to haunt the Unique Identification Authority of India which manages the Aadhaar database containing biometrics and personal information of over 1 billion Indians.