There is no doubt that every organization now requires advanced malware protection. Even so, there are plenty of organizations that have either not yet implemented this protection, or have it only somewhat implemented. Do these organizations recklessly believe they won't be targeted? Do they think their investment in...
For public sector technology leaders evaluating technologies to combat malware attacks, this report offers important considerations for deploying cloud-based security.
Ransomware and other data security threats are a serious concern for any organization, but the stakes are higher and the risks are greater for...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. Cloud systems and images have operating system and component vulnerabilities just like those in the enterprise. For example, Heartbleed, Shellshock and other major bugs can affect cloud systems, and there are new issues to...
As cyber-crime evolves, attacks are complex and creative, and often tailored to the targeted industries and organizations. Therefore, to respond appropriately, one must engage in advanced threat hunting that takes the human factor in consideration.
Today, most of the cyber security community focuses on technical...
As cyber-crime evolves, attacks are complex and creative, and often tailored to the targeted industries and organizations. Therefore, to respond appropriately, one must engage in advanced threat hunting that takes the human factor in consideration.
Today, most of the cyber security community focuses on technical...
A majority of security professionals believe that incident response is more difficult than it was a couple of years ago. The idea of early detection through threat feeds is becoming a myth. Resources and security controls deployed for early detection are turning out to be futile when it comes to dealing with today's...
Four years ago, Aetna Global Security hired a chief data scientist for security - a former NSA data scientist who did an outstanding job building over 100 models and a big data infrastructure dedicated to security. The purpose of hiring this data scientist: to take multiple sources of log files from newly deployed...
Many companies today design their cyber security strategy around an incident centric approach - how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack. Join us to learn how a cyber strategy...
The financial sector continues to be a prime target for highly sophisticated, customized attacks. The SWIFT money transfer system recently came under attack resulting in an $81 million heist of the Bangladesh Bank. This number pales in comparison to an estimated $1 billion stolen from over 100 banks worldwide by the...
Early Detection and rapid response are amongst the most critical capabilities for targeted attack remediation. Media reports indicate that well resources adversaries consistently bypass sophisticated organisational defenses. The issue is less about being able to keep the bad guys out - It's more about detecting them...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.