Implementing and maintaining Payment Card Industry Data Security Standard (PCI DSS) is challenging in today's complex business and technology environments. Many financial institutions only partially comply. By incorporating PCI DSS into a holistic governance, risk and compliance (GRC) program, financial institutions...
Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But...
When it comes to vulnerability management, many organizations opt to protect only their most critical security gaps - but, meanwhile, the criminals exploit the secondary vulnerabilities. Kevin Flynn of Skybox Security explains why context is everything in managing vulnerabilities.
Many media outlets have suggested that the recent arrest of a Russian computer programmer ties to the 2016 U.S. presidential election meddling blamed on Russia. But the only source for this supposed connection traces to a Russian propaganda arm that's been blamed for participating in said meddling.
Unified Endpoint Management affords you the opportunity to put your expensive and ineffective multi-solution dependencies behind you.
While UEM is valuable, it is just another tool. A better tool, but a tool nonetheless. UEM needs something else to make it invaluable.
When used in combination with cognitive...
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter.
In peeling back the onion,...
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees
use a variety of form factors, but they run a variety of platforms on those devices, including:
Apple iOS and Apple...
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae,...
Threat intel feeds are one thing; actionable threat intelligence is quite another. Bryn Norton and Tom Major of Level 3 Communications discuss the unique value of the relevant data they analyze in-house and provide to clients.
In an interview about providing actionable threat intel, Norton and Major...
As hacking incidents appear to spike again on the federal breach tally, a small Kentucky-based physician practice is the latest healthcare entity to report a major breach involving a ransomware attack.
Forty targets in 16 countries were attacked using advanced attack tools and techniques that match the capabilities documented via the "Vault 7" stash of alleged CIA network exploitation documents released by WikiLeaks, Symantec says.
Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, BitSight Technologies really is not seeing a decrease in the number of reported incidents.
Download this whitepaper that discusses:
The high rate of breaches reported by large...
A zero-day flaw in Microsoft Office is being targeted via in-the-wild attacks, security firms warn, including by the notorious Dridex botnet. While there is a workaround, Microsoft says it plans to issue a full fix this week as part of its regularly scheduled security updates.
Spanish police arrested Russian computer programmer Pyotr Levashov, apparently while he was vacationing with his family. Authorities say his arrest relates to alleged Kelihos spam botnet and pump-and-dump stock campaigns, not to Russia's alleged interference in the 2016 U.S. presidential election.
As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile endpoints. And while almost every CIO knows how important mobile security is. There's a lot to consider, and new factors enter the equation all the time. On the pages that follow, you'll find an overview of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.