A perfect storm of factors related to the changing security landscape has led to the rise of MSSPs in today's market. Attacks have increased in frequency and sophistication, so businesses need a more proactive security posture. However, Small to Medium Businesses (SMBs) do not have enough resources or knowledge to...
Get a full overview of the changing security landscape, and more importantly insight into the rapidly changing SIEM category, and the reasons that have led to those changes. To offer a complete picture of the changes to SIEM technology, it is valuable for some to understand the context of the SIEM market and how (and...
Get All 5 Chapters of AlienVault's How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices,...
The biggest companies (the Fortune 500 types) are more often than not taking matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, the "unfortunate" 5,000 and beyond fall further...
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
A lack of computer security professionals in Australia made recruiting difficult. But new changes to immigration rules may really pinch the country's nascent cybersecurity industry.
Advanced malware is capable of outsmarting the detection capabilities of a wide range of security tools. More than 70% of malware now includes sophisticated evasion technologies. And, to make detection even more difficult, the number of evasion methods found in each instance of malware has recently jumped from one or...
Advanced malware avoids being detected and can remain hidden for extended periods of time as it conducts complex and damaging cyberattacks. This sophisticated malware is usually designed to aggressively target anything and everything that can be monetized. How can organizations safeguard their data from these...
A recent survey of more than 300 CIOs and CISOs found that digital transformation is forcing them to rethink their cybersecurity strategies. Executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today's continually changing business...
Bryce Austin, a former technology lead at Target during the retailer's massive November 2013 breach, says the role of the CISO needs to evolve, ensuring that cybersecurity is balanced with the overall needs of the company. He claims tying the CISO's performance to the company's revenue is the best way to do that.
Cloud services firm Coupa is one of the latest business email compromise victims, after a fraudster pretending to be its CEO faked out the HR department and stole all of its 2016 employees' W-2 forms. Security experts say rigorous training remains the only viable defense.
The security landscape changed dramatically with the maturation of crypto-ransomware. Not only did this new type of malware bring about a more lucrative business model for attackers, it also spurred the adoption of many so-called 'next-gen' endpoint security techniques.
While these techniques bring impressive new...
What is notable about today's current state of computing is that there are multiple concurrent shifts taking place while IT and security professionals must still manage and secure legacy environments. Compounding matters is the rate of change, the sheer velocity at which organizations are adopting new architectures,...
The notion of "next-gen" is now promoted by some providers of endpoint security software as a way to improve the efficacy of protecting endpoints from compromise, given the prominent role endpoints play in cybersecurity attacks, the ways in which mobility and cloud apps have expanded the attack surface area, and the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.