With increasing numbers of mobile users, branch offices,
data, and services located outside the protections of
traditional network security appliances, organizations
are struggling to keep pace and ensure the security, privacy,
and integrity of their networks and, more important, their
When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.
In IT Security, we're lucky to stay one step ahead of the bad guys. To give you a half-step more advantage, a panel of Splunk IT security experts has assembled a fresh look at emerging threats - and one major emerging solution.
Learn how to best protect your organization, and your data, against a fast-approaching...
Nation-state attacks. SOC automation. Zero trust. Protection of critical infrastructure. These were some of the key themes that discussed at Information Security Media Group's recent Cybersecurity Summit in Delhi.
Since the $81 million Bangladesh Bank online heist in 2016, the nation's banks have made some progress in cybersecurity, but they still have a long way to go, says Prabeer Sarkar, CEO of Dhaka Distributions, a local cybersecurity company, who sizes up what work still needs to be done.
Mitsubishi Electric says hackers exploited a zero-day vulnerability in its anti-virus software, prior to the vendor patching the flaw, and potentially stole trade secrets and employee data. The Japanese multinational firm announced the breach more than six months after detecting it in June 2019.
ISMG and Cybereason visited Dallas on their "Indicators of Behavior" roundtable dinner tour. And Cybereason CSO Sam Curry says the discussion validated the notion that it's time to reimagine incident detection and response.
Building a public/private partnership for cybersecurity is time consuming and resource-intensive, but such a model can play a key role in protecting critical infrastructure, says Ravikishor Mundada, CEO of the Center of Cybersecurity Excellence, Government of Karnataka.
If you analyze any of the recently published cyber attacks, two patterns emerge:
80-90% of the attacks exploit an unpatched vulnerability or an unhardened, widely open system
70% of the attacks begin at the endpoints
While "cool" new products create a lot of buzz, cyber hygiene is often ignored. But, it must be...
Visibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by knowing which systems, applications and data they have, says AlgoSec's Jeffrey Starr. He discusses how centralized visibility, control and automation can help.
It's critical for SOC team to extensively leverage Artificial Intelligence to transform its operations and enhance its investigation capabilities in making the organization safe from attackers and achieving the business goals.
Despite multiple government agencies being formed to fight cybercrime, efforts need to be made for better coordination between them, said Lt Gen (retd) Rajesh Pant, the newly appointed national cybersecurity coordinator, PM Office, Government of India.
Keeping organizations safe from attackers and staying one step ahead of them is a tough proposition, and hence identifying threats accurately with integrated user behavioral analytics and artificial intelligence makes tremendous sense as this can save invaluable investigation time.
The rapid pace of technological advancement has brought with it the emergence of a number of pain points
as each new technology poses a host of new security challenges. Digital transformation creates challenges
for any organization, but for smaller enterprises with a more compact staff, these changes risk...
It is not uncommon to hear about the perpetual shortage of skilled personnel in the cybersecurity industry. The 2017 Frost & Sullivan/(ISC) 2 Global Information Workforce Study concluded that by 2022, the industry would face a 1.8 million worker shortfall.1
Download this ebook to learn more about: