The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
Mobility and IoT are acknowledged by security practitioners to be a whole different beast when it comes to management. MetricStream's French Caldwell says that GRC likewise needs to change its paradigm to accommodate this disruption.
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud...
An organsation's ability to deliver value to its stakeholders directly correlates to its ability to manage risk. Risk
management is not an exact science because identifying all possible outcomes, assigning probabilities to each and estimating the expected financial impact is often based on judgment and estimates, not...
Data breaches continue to have a major financial impact on organisations, as well as on their reputations. The 2015 Verizon Data Breach Investigation Report (DBIR) evaluates recent breaches and vulnerabilities, and looks at how they affected organisations in multiple industries and countries. While the DBIR is full of...
Continuous network monitoring allows your organisation to take an automated, holistic approach to monitoring your security state and activity. This involves discovering all assets, identify all vulnerabilities, monitoring networks in real time for threats, gathering contextual analytics, and providing assurance that...
Continuous monitoring is among the latest approaches to keep your company safe from hackers. And according to this SANS survey, most organizations claim to have a program for monitoring systems and activities for unauthorized changes, vulnerabilities, abnormal operation, and needed patches. But how effective are...
Many recent breaches have exploited security weaknesses in third party vendors and suppliers
to attack organizations across all industries. In this SANS What Works Case Study, Chris
Porter, Deputy CISO at Fannie Mae details:
His experience using BitSight Security Ratings to assess the cybersecurity level of...
While vendor risk management has long been an area of concern for Financial Institutions, regulators are now looking for banks to do more and provide a higher level of assurance about the security practices of their vendors. But how? With regulators continuously raising the bar, one thing is clear: the vendor reviews...
Traditional signature-based endpoint protection solutions struggle to protect against today's advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with multiple forms of prevention.
Download this...
Cyber risk is high on the list of the most significant risks that organizations face. Many businesses spend millions of dollars annually on people, processes, and technologies to protect themselves against cyber risk.
However, with little visibility into the success
of these investments, many organizations are still...
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.