Security silos persist because stakeholders within the enterprise security ecosystem are focused on their own key performance indicators, says Abdallah Zabian of DXC Technology, who suggests a more holistic approach is needed.
Application control remains one of the best techniques for blocking the vast majority of malware threats; however, implementation often falters due to poor planning.
The FIN7 cybercrime gang regularly phoned victims, posing as buyers, to trick victims into opening phishing emails and attachments with malware, federal prosecutors allege. The group's success - 15 million stolen payment cards and counting - is one measure of how difficult these types of attacks are to block.
A WannaCry outbreak has hit unpatched Windows 7 systems at Taiwan Semiconductor Manufacturing Co., crippling its factories. The world's largest chipmaker, which traced the infection to a new software tool that it failed to scan for malware before installation, says the outbreak could cost it $170 million.
Are cyberattackers working on ways to counter artificial intelligence-augmented security? And will the bad guys ever use AI-driven attacks? Adi Ashkenazy of XM Cyber offers an analysis.
The chief security officer for the U.S. Democratic Party is recommending that all party officials avoid using mobile devices made by Chinese manufacturers ZTE and Huawei. Bob Lord says that even if devices from those manufacturers are free or low cost, no one wants to be the next "patient zero."
Businesses require better protection against malware and
DNS-based exfiltration. To identify the most significant
challenges to achieving a more secure enterprise, Ponemon
Institute - a renowned research center committed to privacy, data
protection, and information security policy - surveyed 604 IT and
...
Many companies that have adopted a layered security strategy still fail to protect their Domain Name System (DNS) infrastructure, a critical Internet protocol that was never designed with security in mind.
Read this white paper to learn why integrating a DNS-based solution with layered enterprise and zero trust...
Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model.
The model's security benefits deliver considerable business value, too. Read this white paper to learn more about:
Reducing the complexity of your security...
As global enterprises tackle the complexities of cloud-first deployments, changing threat and regulatory landscapes, and merging IT and operational technology (OT) networks, implementing a security strategy without any gaps has become an overwhelming challenge. As such, organizations are increasingly automating...
Vulnerabilities don't exist in a vacuum. The risk they pose depends on a variety of factors both internal and external that are in a near-constant state of change - and keeping up with that change is vital to limiting your risk of attack.
Enter: The 2019 Vulnerability and Threat Trends Report which examines new...
As the threat landscape evolves in today's networks, information security teams are scrambling to keep up. Attackers are using new and stealthy methods to infiltrate organizations and steal data, and the complexity of most environments makes it easier than ever for attackers to compromise assets and send malicious...
Cloud-based CRM giant Salesforce.com is warning some of its Marketing Cloud users that any data they stored may have been accessed by third parties or inadvertently corrupted because of an API error that persisted for six weeks.
Attackers have targeted a patched vulnerability to exploit more than 209,000 carrier-grade routers made by Latvian manufacturer MicroTik and infect them with two types of malware - Coinhive and Crypto-Loot - designed to mine for cryptocurrency, security researchers say.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.