infosec

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: May 05, 2020
AN IN-DEPTH LOOK AT USER AWARENESS, VULNERABILITY AND RESILIENCE Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks? Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including: • End-user awareness and knowledge gaps that could be hurting your cybersecurity defences • Impacts of phishing attacks and the ways infosec pros are trying to combat these threats • How Proofpoint customers are approaching phishing awareness training and the ways we’re helping them measure success With this report you will learn how organisations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.
Tags : 
    
Proofpoint
Published By: CloudPassage     Published Date: May 19, 2020
As enterprises increase their use of the cloud to host business applications as part of their digital transformation, security and development teams must transform how they work together. Cloud development moves development from a centralized department developing applications for a private data center managed by a centralized operations team, to distributed teams responsible for both the development and operations of their applications known as DevOps. This can create a gap between security and DevOps. In this on-demand webinar, cybersecurity experts Carson Sweet, CloudPassage CEO and co-founder, and Holger Schulze, Cybersecurity Insiders CEO and co-founder, explore this transition and how both security and DevOps teams can best work together in this new world. Topics include: • The new organization structure security must work in • The new rapid development, continuous integration and continuous delivery model for DevOps • The diverse set of technologies DevOps are deploying in the
Tags : 
    
CloudPassage
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Ensign InfoSecurity     Published Date: Feb 05, 2020
"The pressure on the Banking, Financial Services & Insurance (BFSI) industry to perform has never been greater as the digital world struggles to deal with the onslaught of more prevalent and pernicious threats. To drive growth and increase customer trust, financial institutions are taking advantage of various platforms such as mobile, cloud and social, exposing them to further cybersecurity risks. The recent news has flagged flaws in mobile and web applications as the major routes of intrusions. The Equifax incident was prominently singled out with massive amounts of its customer data being compromised due to a web-application vulnerability. Third-party vendors, including FinTech partners, continue to pose great risk to the financial industry. The 2016 Bangladesh Bank breach cost some USD81 million due to a vulnerability in SWIFT, a shared banking system. As customers continue to move away from physically transacting with banks and other institutions, more enhanced investment in se
Tags : 
    
Ensign InfoSecurity
Published By: Kaspersky     Published Date: Apr 06, 2020
Public cloud usage is growing because it provides so many benefits, including instant scalability, automation, configurability and flexibility.All those engaged in managing public cloud deployment, both Information Security teams and those outside this discipline (such as Dev Ops or Web Dev) need to ensure that the security of corporate assets is seen as a planning cornerstone. This White Paper is designed to arm InfoSec Specialists with the information and evidence needed to ensure that Cloud Workload Security, i.e. the security of the Operating System that the workload is running, is treated as a fundamental consideration in cloud deployment scenarios. It is, after all, your problem – if your security is breached in the cloud, whoever is technically to blame, you’re always going to have to handle the consequences. We aim to counteract the erroneous view that things like software vulnerability exploitation (login bypass, remote code execution, etc), update repo poisoning, network conn
Tags : 
    
Kaspersky
Published By: Intel     Published Date: May 28, 2020
The shift to data-centric business models has not only increased the value derived from data but also vulnerabilities. Intel IT has developed a new cyber analytics platform based on leading Intel® technologies such as Intel® Xeon® Platinum processors, Intel® Optane™ SSD, along with Splunk and Kafka to provide faster insights into threat prevention and detection. Find out how the new Intel Cyber Intelligence Platform (CIP) offers the agility and efficiency to detect incidents with: • Easy implementation and quick ramping of human talent • A common work surface across all of InfoSec • Complete threat categorization • Simple integration of third-party security tools • Connection to open source ML libraries
Tags : 
    
Intel
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: Carbon Black     Published Date: Apr 27, 2020
Welcome to our comprehensive guide on the basics of cybersecurity. Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of exposure to InfoSec. A good way to do that is to learn from and get connected in the community. Cybersecurity is a fascinating and rapidly evolving area of IT. And those that are involved are friendly people who care passionately about keeping us all safe. With information from over 150 sourced references, and personal input from The Howler Hub community of security experts, this guide contains the key information to help you: Understand key concepts that drive the security professional. Learn a common language to engage with cybersecurity professionals. Connect with sources to stay up-to-date on this evolving field. Engage with cybersecurity experts and the threat hunting community at large.
Tags : 
    
Carbon Black
Published By: Shape Security     Published Date: Sep 16, 2019
Starbucks’ Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large.
Tags : 
    
Shape Security
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: McAfee EMEA     Published Date: May 12, 2020
If you work in infosec and haven’t been living under a rock, you have undoubtedly heard of EDR. EDR, or endpoint detection and response, promises to revolutionize the way security analysts neutralize attacks. Unfortunately, like many other solutions in the infosec space, EDR has fallen short of the promised hype. A typical sales pitch for an EDR goes something like this: “Sure, we all know you can check for alerts in the SIEM, open an escalation ticket in your productivity software suite, and alert a systems administrator to take action. But in the time that all takes, the attacker may well have performed a smash and grab, thus stealing your data. The problem isn’t that you don’t have enough detection capability; the problem is that it’s all over the place. Even then, how are you going to respond? Time is money, and time favors the attacker. That’s why you need EDR. It consolidates the detection functions and the response functions into one platform.” But as you’ve probably guessed, ED
Tags : 
    
McAfee EMEA
Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nation’s top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security, data management
    
Rsam
Published By: Tenable     Published Date: Apr 30, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Results from the 2nd Annual Cost of Cyber Crime Study, clearly illustrate that despite increased awareness of the impact of cybercrime, cyber attacks continue to occur frequently resulting in serious financial consequences for business and government
Tags : 
    
Quinstreet - Infosec
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : 
security, enterprise applications
    
Quinstreet - Infosec
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
There are wide variations in the level of SIEM technology support for specific use cases, so understanding them is a prerequisite for selecting the best product in a given situation
Tags : 
security, enterprise applications
    
Quinstreet - Infosec
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.