Beyond mere information sharing, collective defense is a concept that aligns public and private sectors in a unified front against cyber threats. Bill Swearingen of IronNet Cybersecurity defines the concept and how it's being employed today.
Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey. Here's what enterprises need to keep in mind when selecting security technology for IoT.
Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and...
You've read the daily headlines about security misfortunes of businesses and government organizations. The digital age (AKA the rising adoption of the internet, cloud apps, IoT, and even public WiFi) is creating an even easier playing field for cybercriminals. And the web traffic flowing through these new technologies...
Hackers tried two methods of exploiting a zero-day vulnerability in Sophos' XG firewall, but Sophos says it made a temporary fix that mitigated the risks. Attackers originally attempted to plant a Trojan, but then switched to ransomware.
Companies add tool after tool to secure their data, systems, and users. But instead of increased security, they're left with misconfigured, repetitive, or siloed tools and little visibility and control over their environments. This leads to poor cyber hygiene and creates severe security vulnerabilities, especially as...
Internet usage around the world is shifting as a result of COVID-19. We are seeing an increase of 10-30% traffic across the board. As companies face a sudden surge in traffic, it is important that they ensure the availability of critical systems that serve their customers and employees.
Join Anand Guruprasad,...
A recently discovered cyber-espionage toolkit called Ramsay is designed to infiltrate air-gapped networks to steal documents, take screenshots and compromise other devices, according to the security firm ESET.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
Done right, a zero trust architecture can reduce the complexity of one's environment while also improving cybersecurity protection and efficiency. Bob Reny of ForeScout focuses on three critical considerations: visibility, compliance and control.
Network engineering and operations leaders are looking to replace their traditional
wide-area network (WAN) architectures with software-defined wide-area networks
(SD-WAN) in order to support the ever-increasing traffic demands (and associated
connectivity costs) that come with digital innovation (DI). These...
As the use of business-critical, cloud-based applications and tools continues to
increase, distributed organizations with multiple remote offices are switching
from performance-inhibited wide-area networks (WANs) to software-defined WAN
(SD-WAN) architectures. SD-WAN offers faster connectivity, cost savings,...
Digital transformation is a strategic initiative for the majority of distributed organizations in 2019. The need to support cloud-based applications across sites has led many organizations to switch from wide-area networks (WANs) to software-defined WANs in an effort to eliminate performance and operational...
Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.