As big-data analytics matures, it will play a bigger role, but security information and event management software, or SIEMs, will also remain essential, contends Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Vishal Salvi of Infosys on the CISO's evolving role. Another influencer, Pavan Duggal, advocate, Supreme Court discusses what steps the Indian government should take to secure privacy....
Today's proliferating threat landscape is making demands of the existing security infrastructure, its orchestration and response, for which it may never have been designed. And SIEMs are no different. In the age of advanced threats, the need to go beyond the SIEMs traditional roles is being keenly felt given the...
Target has reached a record settlement agreement with 47 states' attorneys general over its 2013 data breach. The breach resulted in hackers compromising 41 million customers' payment card details and contact details for more than 60 million customers being exposed.
When trying to detect which security events are malicious, analysts have long battled signal-to-noise problems. LogRhythm's James Carder describes how behavioral analytics, case management, security automation and threat intelligence can help.
Dear customer: "The security and privacy of your systems are our priority." Cue a new breach notification, this time from Lightspeed POS, which sells a cloud-based point-of-sale product used by 38,000 organizations.
Too many organizations have too many disjointed security controls, says Vijay Bharti, Vice President and Head of the Security Unit at Happiest Minds. What do they need? In this interview, Bharti talks about the pressing need for an integrated cybersecurity approach that includes analytics, machine learning and a...
Reports on the Ukrainian energy supplier hack have left many crucial questions unanswered: Who was involved, did malware directly trigger a blackout and are other suppliers at risk from similar attacks? Cybersecurity experts offer potential answers.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
Security on the endpoint took a long time to move away from mere patching, hardening and anti-virus technologies. To fight advanced threats, experts say visibility on endpoints is being transformed by the advent of endpoint detection and response tools.
Session Preview:
As the weapon is installed and begins to utilize mechanisms, such as remote access Trojans or backdoor channels to become resident, it will leave a trail of threat indicators. Certain malware focused anomaly detection solutions can recognize these indicators helping to facilitate a response, while...
Best-Practices for Getting Across the Right Messages
The board members at a financial institution are responsible for oversight and implementation of a sound security program, including the overall guidance and direction of setting a cultural value related to risk awareness, driving policy and strategy, defining a...
Expertise and Interactivity Key to Developing a Collaborative Security Education ProgramThe perspective on information security changed forever on September 11, 2001. From being a check box response on a training attendee sheet or just a mandatory requirement, security training awareness education has today...
Richard Swart: Hi, this is Richard Swart with Information Security Media Group, publishers of BankInfoSecurity.com and CUInfoSecurity.com. Today we'll be speaking with Mark Lobel, an internationally recognized security and internals control professional who is a partner in information security practice at Price...
In this Information Security Media Group podcast Mark Lobel of PriceWaterhouseCoopers speaks to our audience and updates on recent trends in info security and the importance of effective benchmarking.
Mark Lobel is a nationally known expert in information security who leads the PriceWaterhouseCoopers annual survey...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.