Contrary to common assumption, "advanced malware" is not a singular type of superior malicious code or harmful object that can that compromises systems, harvests data or damages corporate networks. Rather, this term describes sophisticated behavior and evasion capabilities that certain strands of malware possess which...
The latest edition of the ISMG Security Report leads with a closer look at a new exploit kit and whether it represents a resurgence in these types of criminal packages. Also featured: a discussion of new vehicle security concerns and communications advice for CISOs.
Communication consultant Michael Santarcangelo outlines three key questions CISOs should ask at the outset of any project to convey security's value and clearly set expectations
It can be incredibly disruptive and time-consuming to add new security technologies to your network. However, it is vital to continue to advance your organization's ability to detect and respond to advanced malware - especially malware that evades other "advanced" security tools like sandboxes and...
It's tough to find the right cybersecurity professionals to hire. Ben Chung, CISO at NTT Communications ICT Solutions, a global IT provider, describes how he narrows down candidates.
The biggest companies often take matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, smaller companies fall further behind, struggling to find talent and budget, while security...
The 2017 RSA Conference Asia Pacific & Japan, to be held July 26-28 in Singapore, will offer a security road map, imparting lessons to practitioners to help them navigate through cybersecurity complexities. Here's a preview of some of the top sessions.
Earlier this year, IBM announced the availability of Watson for Cyber Security, described as "the industry's first augmented intelligence technology designed to power cognitive security operations centers." But how will Watson complement human security teams? And what do beta customers say about their initial...
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape?
Download and read this transcript of Martin Borrett of IBM and Ronan Murphy of Smarttech discussing the promise and impact of Watson for Cyber Security at this year's Infosecurity Europe in London, and learn...
A former Qualys customer for more than a decade, Mark Butler is now the company's CISO. And one of his jobs is to help spread the word to other security leaders about the vendor's vulnerability management solutions.
It's not enough to comply with government and industry regulations such as SOX, PCI, MICS, and HIPAA. Organizations must also prove their compliance to auditors on a regular basis. Even companies not bound by regulatory requirements may need to confirm their adherence to internal IT security policies.
But...
The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
Enterprises that develop a mobile strategy and implement the right solution can expect significant benefits, as can those that update their existing strategy to keep pace with the evolving enterprise mobility landscape. Mobility is a journey, and to begin, it's useful to understand where your organisation falls on the...
A perfect storm of factors related to the changing security landscape has led to the rise of MSSPs in today's market. Attacks have increased in frequency and sophistication, so businesses need a more proactive security posture. However, Small to Medium Businesses (SMBs) do not have enough resources or knowledge to...
MeitY is requiring every government department in India to appoint a senior staff member as CISO. But some security experts question whether there are enough qualified security experts in all government departments to fill the new CISO positions and suggest departments consider hiring outside experts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.