While security operations is a high priority, many organizations continue to struggle to keep up with the scale and scope of the tasks at hand. This is because security operations are often hamstrung by organizations’ reliance on an overabundance of point tools and manual processes, as well as a shortage of advanced...
Tom Kellermann calls it a new "Twilight Zone" - an era in which cybersecurity adversaries can unleash destructive attacks that manipulate time, data, audio and video. The cybersecurity strategist shares insights and analysis from his latest Global Incident Response Threat Report.
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
Cybersecurity awareness training is one of the most important things you can do to secure your organization. But starting a new program may seem daunting. Maintaining one that keeps your users engaged, changes their behavior and reduces your organization’s exposure to threats might be an even bigger challenge....
Dan Kaminsky, a renowned security researcher, died last week at age 42. He gained cybersecurity fame in 2008 after discovering and helping to coordinate a patch for a massive security flaw in the internet's Domain Name System.
The lack of automation and actionable threat intelligence may be preventing enterprises from developing the fully functional Cyber Fusion Centers they envision. Anomali's Mark Alba shares ideas on how to change that.
Increase in phishing and ransomware attacks - along with continued high numbers of Web Application Attacks - underscore a year of unprecedented security challenges. What you need to know:
Report analyzes 29,207 quality incidents, of which 5,258 were confirmed breaches
Phishing attacks increased by 11 percent,...
To help prevent and defend against emerging cyberthreats, CISOs must develop a multi-line defense strategy and invest in threat-hunting capabilities and orchestration, a panel of cybersecurity experts advises.
Threat intelligence can be a useful addition to your security toolkit. It
can provide your analysts with information and context they would
not have otherwise. There are many factors to consider, including
where to obtain the intelligence, how to collect it, how to integrate it,
and how much to...
To enhance organizations' security postures in the year ahead, CISOs must strengthen authentication processes, increase the use of network segmentation tools and deploy effective threat intelligence capabilities, two CISOs recommend.
Could hackers inject malicious code that compromises the synthetic DNA supply chain and ultimately tricks bioengineers into inadvertently developing dangerous viruses or toxins? A new research report says that's a growing concern and calls for robust security measures.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
See how the different security vendors stack up.
Get an overview of endpoint security features, and capabilities, including next-gen technologies;
Compare the leading vendors including Sophos, Symantec, McAfee, Kaspersky, Microsoft, Bitdefender, Trend Micro, SentinelOne, and CrowdStrike;
See a summary of...