Home Tags Security strategy

Tag: security strategy

Symantec Snaps Up Skycure in Mobile Security Move

Acquisition fills gap in Symantec's Apple iOS mobile security strategy - and addresses the future of 'mobile first,' Symantec CEO says.

Failures in planning, implementation and monitoring are biggest security threats to...

Free presentations on Nuvias (incorporating Wick Hill) stand from leading security industry experts - including State-of-the art Protection, Ransomware, DDoS, and Phishing6/6/17 - Probably the biggest security threat to companies today, claims Ian Kilp...

Australia’s grand cyber plan swamped by reality: ASPI

Slow pace, no transparency, poor communication. One year in, the Cyber Security Strategy needs more attention, says one of the nation's leading cyber think tanks.

Facebook decides fake news isn’t crazy after all. It’s now a...

Once dismissed by Zuck, misinformation now merits revised security strategy Analysis  Last November at the Techonomy Conference in Half Moon Bay, California, Facebook CEO Mark Zuckerberg dismissed the notion that disinformation had affected the US presidential election as lunacy.…

Machine Learning in Security: 4 Factors to Consider

Key factors to consider before adding machine learning to your security strategy.

US faces limits in busting Russian agents over Yahoo breach

In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what now?Security experts say Wednesday’s indictment might amount to nothing more than naming and shaming Russia. That’s because no one expects the Kremlin to play along with the U.S. indictment.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]“I can’t imagine the Russian government is going to hand over the two FSB officers,” said Jeremiah Grossman, chief of security strategy at SentinelOne.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Preparing for the professional cybercrime industry

Cybercrime has become big business.

These days, you’re not protecting your information systems from a guy in his basement who hacks random websites for the thrill of it. You’re up against full-blown professional cybercrime “companies” that employ everyone from customer service reps to graphic designers.Brian Krebs recently published a story mentioning a “slick and professionally produced video advertisement” for a new ransomware-as-a-service package. What does this mean for IT professionals? It means cyberattacks are becoming more effective and more numerous, and you may need to change your security strategy.To read this article in full or to leave a comment, please click here

Hacktivist or script kiddy? Know your 10 types of hacker

Different shapes and sizesImage by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

Travis Farral, director of security strategy at Anomali, outlines the top 10 types of hackers you should have on your radar.To read this article in full or to leave a comment, please click here

Organizations Failing to Implement Planned Cyber-Security Strategies

Intel's Security's survey of cyber-security operators and executives finds that among its top findings, nearly all organizations say they have a cyber-security strategy in place when not even half do.

There’s Disconnect Between Security Execs, Operators, Report Reveals

An IBM Security survey finds a disparity between cyber-security operators and executives on how they think their security strategy is faring.

Survey Finds Disconnect Between Security Strategy and Execution

Report from Intel Security and CSIS discovers 93% of businesses have cybersecurity strategies, but only 49% fully implement them.

Mimecast Tackles Email-Bound Risks

At RSA, Mimecast cyber security strategy Bob Adams discusses graduating from basic filtering to true email security risk assessment.