On Nov. 8, Tenable Chairman and CEO Amit Yoran wrote a letter to Congress in support of CISA. In this episode of "Cybersecurity Insights," Yoran calls the agency the "primary focal point of our defensive efforts" and discusses why the country needs to stay unified on defeating cyberthreats.
In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."
BlueVoyant purchased a risk management vendor led by an Army veteran to expand its SaaS footprint with U.S. government and defense industrial organizations. Buying Conquest Cyber will allow BlueVoyant to provide cyber risk maturity and compliance assessments to both federal and commercial customers.
Cybercriminals are increasingly using supply chain attacks to distribute malicious software to devices. In this type of attack, attackers gain access to a company's account on a, such as GitHub, which is used to store source code and software files. The attackers then upload a malicious software package that looks...
A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.
New York State will soon seek public comment on sweeping new cybersecurity regulations for hospitals. The proposed rules would come with $500 million in requested funding to help the providers step up their security investments to comply with the new requirements.
In today's data-driven world, organizations rely on a multitude of applications to drive business operations and deliver exceptional user experiences. However, managing and controlling application usage can be a daunting task. App Control is a comprehensive tactic that empowers organizations to take control of their...
A breakthrough star in Forrester's latest vulnerability risk management rankings hauled in $34 million to expand into the cyber risk and attack path management markets. The Series B extension funding will allow Vulcan Cyber to go beyond legacy vulnerability management and take on ASPM.
The financial services threat landscape is continually evolving. Matanda Doss, executive director of cybersecurity and technical controls at JPMorgan Chase, stressed the need to build security measures into an organization's infrastructure, starting with critical assets.
In the rapid digitization of manufacturing, energy, and critical infrastructure industries, the integration of Operational Technology (OT) with Information Technology (IT) systems is driving innovation and efficiency. However, this convergence brings a pressing concern: cybersecurity threats targeting OT environments...
Malware families can contain multiple variants, each with different capabilities, delivery methods, or evasion techniques.
As the threat landscape evolves, threat actors constantly improve their malware families to evade detection and achieve their objectives. They may add new features, exploit new vulnerabilities,...
This insights article covers how next-generation case management solutions should be unified, agile, and scalable. It covers the obstacles financial institutions face, what to consider when comparing solutions, and how to best prepare for future areas of investment.
This datasheet explains how ActOne Network Analytics and Exploration, a powerful investigative tool, uncovers hidden relationships with individuals and entities. By visualizing these connections, investigators gain greater insight into an entity and its associated risk.
This eBook explores how fractured, traditional approaches won’t improve investigation speed or accuracy. To operate at the speed of risk, financial institutions need a next-gen case management solution that speeds up investigations and meets their diverse demands.
This datasheet explains how ActOne Dynamic Workflow offers a risk-calibrated workflow powered by data intelligence. This solution streamlines financial crime programs, empowering business users to accelerate alert triage with intelligent automation that uses decision logic.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.