When executives take an active role in understanding cyber security risks (industry-specific and global) and collaborating with their C-level peers, the organisation becomes considerably better positioned to protect its critical assets.
"Executives need to figure out what really matters to them. What are the...
Cyber security awareness is growing as more businesses learn that their networks are vulnerable to an attack. The emerging consensus is that the IT department alone cannot handle security; all employees, especially C-level executives, have a part to play.
In fact, executives are responsible for not only the security...
Today's cyber landscape has become a matter of 'when' not 'if' a cyber breach will affect your organisation.
In this environment, running a successful organisation requires mature cyber incident response capabilities that lead to strong organisational defense and mitigation of harmful breaches. C-suite understanding...
In many instances, we learn that companies have an incident response plan that looks good on paper but not in practice. The plan cannot just live in a manual that sits on a shelf. It needs to be a strategy that everyone agrees to, can evolve over time, is rehearsed often and can be carried out immediately when the...
In this report, we explore some longer-term trends, many of which have evolved. We look at organisations that have been targeted or re-compromised after remediating a previous attack.
We also examine the widening cyber security skills gap and the rising demand for skilled personnel capable of meeting the challenges...
When it comes to detecting compromises, organisations appear to be getting better at discovering breaches internally, as opposed to being notified by law enforcement or some other outside source.
This is important because the data in this report shows that incidents identified internally tend to have a much shorter...
During a video interview with Information Security Media Group, FireEye's SVP and COO, Kevin Mandia, details the three stages of advanced threats; attractive nuisances, criminal activity, and nation-state activities.
During a video interview with Information Security Media Group, David DeWalt, CEO of FireEye, discusses what is wrong with the market today, and how it can be fixed.
During a video interview with Information Security Media Group, FireEye's David DeWalt, CEO, and Kevin Mandia, SVP and COO, discuss the new security model, and how to effectively prevent against cyber-threats.
In recent years, enterprises and government agencies have fallen prey to a myriad of successful cyber attacks of unprecedented sophistication and reach. Despite spending over $20 billion annually on traditional security defenses, organizations find themselves battling a new generation of cyber attacks, such as...
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more...
Learn how to prevent spear phishing - the latest and most dangerous technique in the cybercriminal's arsenal - from infiltrating your networks and compromising your customer data, intellectual property, and valuable trade secrets.
This white paper from FireEye, written specifically for CISOs, IT Security Directors,...
The threat landscape has changed. Cybercriminals are simply more equipped than ever. And those next-generation firewalls, intrusion detection systems, anti-virus and security gateways are already outdated against advanced and more agile threats. Financial organizations must turn to true modern-day protection...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.