14.1 C
London
Thursday, November 23, 2017
Home Tags Security strategy

Tag: security strategy

Global leaders weigh the benefits and dangers of a future in which AI plays a greater role in business and security strategy.
The Victorian government has launched its Cyber Security Strategy, developing a 32-point framework it hopes will keep government services and information safe from cyber threats.
Vacations are over, school is about to start, and people are starting to think about what to do in the four months until the end of the year.
In IT, that means driving success in the cloud.Many IT manages have been incentivized with impending deadlines for shutting down enterprise data centers, migrating applications, and converting data from the enterprise to the cloud data conversion projects.
Itrsquo;s all a bit overwhelming.

But there are two things you must do before 2017 is over.[ What is cloud computing? Everything you need to know now. | Also: InfoWorldrsquo;s David Linthicum explains what exactly is edge computing. ]1.

Think securitymdash;yes, again When considering the public cloud, security should be systemic to everything you do.

This includes when encryption, key management, and the use of identities. However, most enterprises moving to cloud have no real definition of their security strategy, not to mention policies or the selection of enabling technology.To read this article in full or to leave a comment, please click here
Anomali's Director of Security Strategy Travis Farral discusses how security pros can better use the threat intel feeds and tools they already have.
Acquisition fills gap in Symantec's Apple iOS mobile security strategy - and addresses the future of 'mobile first,' Symantec CEO says.
Free presentations on Nuvias (incorporating Wick Hill) stand from leading security industry experts - including State-of-the art Protection, Ransomware, DDoS, and Phishing6/6/17 - Probably the biggest security threat to companies today, claims Ian Kilp...
Slow pace, no transparency, poor communication. One year in, the Cyber Security Strategy needs more attention, says one of the nation's leading cyber think tanks.
Once dismissed by Zuck, misinformation now merits revised security strategy Analysis  Last November at the Techonomy Conference in Half Moon Bay, California, Facebook CEO Mark Zuckerberg dismissed the notion that disinformation had affected the US presidential election as lunacy.…
Key factors to consider before adding machine learning to your security strategy.
In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what now?Security experts say Wednesday’s indictment might amount to nothing more than naming and shaming Russia. That’s because no one expects the Kremlin to play along with the U.S. indictment.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]“I can’t imagine the Russian government is going to hand over the two FSB officers,” said Jeremiah Grossman, chief of security strategy at SentinelOne.To read this article in full or to leave a comment, please click here
Cybercrime has become big business.

These days, you’re not protecting your information systems from a guy in his basement who hacks random websites for the thrill of it. You’re up against full-blown professional cybercrime “companies” that employ everyone from customer service reps to graphic designers.Brian Krebs recently published a story mentioning a “slick and professionally produced video advertisement” for a new ransomware-as-a-service package. What does this mean for IT professionals? It means cyberattacks are becoming more effective and more numerous, and you may need to change your security strategy.To read this article in full or to leave a comment, please click here
Different shapes and sizesImage by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

Travis Farral, director of security strategy at Anomali, outlines the top 10 types of hackers you should have on your radar.To read this article in full or to leave a comment, please click here