When it comes to detecting an advanced persistent threat attack, the key to success is not only looking at what anomalies are in the network, but also understanding why certain activities are suspicious, says cybersecurity specialist Mahesh Sogane of the global oil company Shell.
Federal government agencies certainly are not immune from phishing scams, and Aaron Higbee of Cofense is focused on tackling the unique challenges that government faces in detecting and stopping the crimes.
Driven by boards of directors' demand for better risk management practices and insight into the risks facing their organization, demand for frameworks and models to help has been skyrocketing, says Jack Jones, chairman of The FAIR Institute.
Distributed denial-of-service attacks are spreading to new channels, including the internet of things, says Netscout's Hardik Modi, who offers insights from a new threat intel report.
Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses.
Integrated risk management and compliance offerings are moving to the cloud in a significant way to keep pace with digital transformation, says Vasant Balasubramanian of ServiceNow.
Integration and orchestration are critical components of managing risk, says Nik Whitfield, CEO of Panaseer, who discusses the importance of visibility.
Highly secure, high-assurance cryptography is required to securely remotely manage autonomous vehicles and internet of things device, says Peter Galvin of nCipher.
Because so many organizations and government agencies are functioning in silos, a key component to India's soon to be finalized cybersecurity policy is the creation of an interministerial task force to respond to growing threats, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.
Automated workflows can help pre-emptively report cybersecurity risks to the board and allow for better qualitative approaches to interpreting data, says Ben de Bont, CISO of ServiceNow.
Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.
As businesses face pressure to release software faster, security is unfortunately not keeping pace, says Anthony Bettini of WhiteHat Security, who reviews DevSecOps challenges.
A network-based approach to visibility can succeed in providing critical insights, while node-based approaches may hit bottlenecks, says Lastline's Giovanni Vigna.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.