Artificial Intelligence, Machine Learning and Data Science are among the many disciplines abused by cybersecurity marketing and snake oil salesman alike. But how do you separate snake oil from reality? Where do you turn for practical insight on emerging technologies that truly can improve your cybersecurity defensive...
The likelihood of a cyber-attack that bypasses all of your security controls is high and often not detected until it's already over. To solve this problem service providers have created a radically new model of cyber security services called Managed Detection and Response or MDR. The focus of MDR is to detect the...
Traditional Authentication is not a standalone fraud killer. One Time Passwords, Biometrics, Mobile Authentication via PUSH or SMS, these technologies by themselves are being subverted by new attacks. 15 years ago, with FFIEC guidance, One Time Passwords reduced fraud by themselves by over half. Today, new forms of...
Trustwave SpiderLabs has uncovered a new type of cyber-attack targeting the financial industry. Come find out how this "hybrid-style" campaign has resulted in over one billion USD in losses. Featuring a case study on a series of investigations, you will see the most recent pivot in the banking threat landscape and get...
Many medical device makers appear to building better cybersecurity into their products, but some manufacturers are still avoiding fixing vulnerabilities in legacy devices that pose potential safety risks, says security researcher Billy Rios, who discusses the latest flaws in some Medtronic cardiac devices.
An analysis of the privacy issues Amazon will face as it dives deeper into the healthcare business leads the latest edition of the ISMG Security Report. Also featured: A preview of ISMG's Security Summit in New York Aug. 14-15.
As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh.
The cybersecurity community is heavily focused on what attackers are doing. While threat intelligence and vulnerability research is invaluable, it only represents one side of the equation. Far less research has been dedicated to how defenders are responding.
Download this research paper for in-depth analysis...
Digital transformation is putting pressure on every organisational function - especially IT Security.
But how and why does digital assets provide great benefits? And why is collaboration key to securing a dynamic IT environment?
This eBook shares perspectives on how your peers are beginning their Cyber Exposure...
Security professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers' access to exploits and defenders' ability to assess, remediate and mitigate them.
The attackers gain and maintain the advantage if they can stay at least one step ahead...
Check Point says it has found three ways to falsify messages in WhatsApp, which it claims could be employed by scammers and used to spread fake news. WhatsApp acknowledges the findings, but it will not engineer patches.
Although there's widespread agreement that addressing security early in the software development cycle is an essential component to any breach prevention strategy, implementing DevSecOps can prove challenging.
Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.
Security silos persist because stakeholders within the enterprise security ecosystem are focused on their own key performance indicators, says Abdallah Zabian of DXC Technology, who suggests a more holistic approach is needed.
Application control remains one of the best techniques for blocking the vast majority of malware threats; however, implementation often falters due to poor planning.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.