In the last two years, 51% of financial services institutions (FSIs) have experienced a data breach, and the severity and volume of cyberattacks continue to increase. A global survey of 469 cybersecurity professionals shows that FSIs can dramatically reduce the
risk of being breached by improving end-toend...
The severity and volume of cyber attacks is increasing. However, most organizations are not comparably enhancing their abilities to prevent hackers from exploiting attack vectors. In fact, it’s taking longer to detect and longer to patch critical vulnerabilities than last year. The cost and
consequences of this...
In our 22-criterion evaluation of GRC platform providers, we identified the 12 most significant ones — Enablon; Galvanize; IBM; LogicManager; MetricStream; NAVEX Global; Riskonnect; RSA, a Dell Technologies Company; SAI Global; SAP; ServiceNow; and Workiva — and researched, analyzed, and scored them. This report...
EDR, NDR, XDR – we keep rebranding defense, but it all still comes down to detection and response, says Erin Sweeney of ReliaQuest. She discusses the latest evolution and how enterprises are deploying it.
Get answers to all your questions about how to seize cloud opportunities and realize your business’ potential—while also protecting all your data beyond what’s possible on-premises—in this wide-ranging conversation among experts and thought leaders from Microsoft and Barracuda. And a sneak peek of the Cloud to...
Enterprises can enhance cloud security by taking several steps, including adopting the secure access service edge, or SASE, concept and using a proxy firewall, says Nick Savvides of Forcepoint.
MITRE introduced the ATT&CK® evaluation as an EDR product assessment leveraging the ATT&CK® framework for APT3. MITRE’s framework is useful in helping organizations make informed decisions when purchasing cyber security solutions using EDR technology.
F-Secure’s participation in MITRE’s first round of...
Organizations in the APAC region are not immune to the impact of the SolarWinds supply chain hack, so it's essential that they reassess their risk management practices and audit their suppliers, two security experts stress.
Good news on the cybercrime front: "Cryptocurrency-related crime fell significantly in 2020," compared to 2019, reports blockchain analysis firm Chainalysis. Unfortunately, in the same timeframe, ransomware profits surged 311%, stoking calls for a crackdown on ransom payments.
Because many attacks against enterprises' cloud implementations are automated, a good defense involves using predictive technology that can analyze behaviors, says Brandon Tan of Forcepoint.
To enhance organizations' security postures in the year ahead, CISOs must strengthen authentication processes, increase the use of network segmentation tools and deploy effective threat intelligence capabilities, two CISOs recommend.
An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
New Extended Detection and Response (XDR) solutions were built to unify multiple prevention, detection and response technologies into a single platform to provide comprehensive visibility and protection. As cyber-threats become more sophisticated and niche protection solutions remain frustratingly disconnected, a...
Are insurers getting cold feet over covering losses to ransomware? With claims due to ransomware skyrocketing, some insurers have reportedly been revising offerings to make it tougher for companies to claim for some types of cybercrime, including extortion.
By consolidating data from different sources, XDR positions itself as an attack-centric tool and not a role-centric tool, which Prateek Bhajanka, senior principal analyst at Gartner, says helps it to detect attacks from anywhere.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.