Destructive malware attacks, once rare, have been surging as attackers seek to cover their tracks and complicate life for incident responders, says Rick McElroy, head of security strategy at Carbon Black.
It's not enough to detect an attack. To be truly effective, defenders need to capture digital fingerprints and movement through the network. Lastline CEO John DiLullo discusses this level of defense.
In the expanded, virtual enterprise, security leaders face the challenge of defending an ever more complicated attack surface. How can they best understand and mitigate their risks? Kelly White of RiskRecon shares insights.
Symantec and scores of partners have launched a new integrated cyber defense initiative aimed at promoting industry collaboration and delivering new business value, Art Gilliland explains.
F5 Networks is a vendor of application security solutions, but its DevSecOps professionals also have the need for actionable threat intelligence, says Preston Hogue, who discusses the advent of new solutions.
A funny thing happened on the way to dark web intelligence-gathering: Some organizations began to amass and share a lot of private information, potentially in violation of privacy regulations and industry rules, says Danny Rogers, CEO of Terbium Labs.
Organizations may have great cybersecurity intentions, but translating those desires into a robust security reality is often challenging, says Ratinder Ahuja, CEO of ShieldX Networks. That's why he advocates automation to ensure intention equals reality.
It's a common refrain that people are security's weakest link. But Stu Sjouwerman of KnowBe4 has a solution that adds a critical additional layer to address that vulnerability.
Web hosting firm XBT/Webzilla's infrastructure was used to attack the U.S. Democratic Party and for 2016 election interference, a former National Security Council official said in a court report filed as part of a since-dismissed defamation lawsuit over the Steele dossier's release.
North Korea's cybercrime capabilities have given the country the ability to flaunt international sanctions by allowing the regime to steal millions in currency not only from banks but also from cryptocurrency exchanges, according to a report from the United Nation's Security Council.
The former CEO of what was once the world's most popular bitcoin exchange, Mt. Gox, will not serve prison time. Mark Karpelès was sentenced Friday to two and a half years in prison on one charge of falsifying data, but the sentence was suspended. He was cleared of embezzlement and fraud charges.
Machine learning systems adapt their behavior on the basis of a feedback loop, so they can overlearn and develop blind spots, which if not understood by practitioners can lead to dangerous situations, says Sam Curry of Cybereason.
"Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology.
Getting a telemetry stream back from applications can help organizations to "adjust much more quickly to see how practical attacks are happening on the endpoint and then go to mitigate," says Aaron Lint of Arxan.
Greg Jensen of Oracle Security discusses highlights of the Cloud Threat Report, prepared in partnership with KPMG, and why shared responsibility is now a primary focus.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.