The modern enterprise faces a growing security challenge involving the need to protect apps and data as your organization concurrently innovates and delivers new applications that are built, scaled, and operated differently in the modern cloud world.
This ebook is your guide to help you think about cybersecurity...
Cyberattacks are proliferating rapidly and growing in scope as adversaries move laterally across the network and traverse diverse environments. As the Security Operations Center (SOC) works to deal with the increasing threat, they can find themselves overwhelmed by an unacceptably high level of false positives,...
Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.
Unlike other types of security threats, insider threats are complicated because only a few are caused intentionally, and they typically involve valid credential use. Beyond full- and part-time employees, insiders include vendors, customers, and others who can be working on site or remote. Frequently they’re...
Cloud-native SIEM dramatically simplifies deployment and management, and increases ease of use, speed, and detection accuracy. As organizations grow, merge, and evolve, cloud-native security solutions can offload the costs of hardware and maintenance from IT teams and simplify operations for security engineers and...
In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.
Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
The ever-expanding threat landscape and the continued talent shortage mean defenders increasingly need to be ready with the skilled talent to face the onslaught of cybercriminals, who are gaining momentum by employing new tactics, according to Pamela Nigro, ISACA board chair.
Many longtime employees have retired,...
Prioritizing which parts of your business need to be fixed first is daunting and your day is likely preempted by account lockouts, breaches making headlines, and simply trying to answer your CEO’s questions, like “are we secure” and “how do we know?”
Watch this panel as we discuss how to use cloud-native...
The speed at which we're seeing ransomware attacks has increased dramatically in the last couple of years - and it's only getting faster, warns Mary O'Brien, general manager, IBM Security. Ransomware deployment has increased from three months to four days on average.
According to this year’s SANS Threat Hunting Survey, threat hunting resourcing is an “ever-growing staffing nightmare.” 73% of this year’s respondents claimed that their biggest challenge is finding skilled staff. This is a 7% increase over 2022, and a whopping 43% increase over 2021.
This talent drought...
Organizations often face challenges when they aim to build sustainable security programs at scale. Anna Westelius, director of security engineering with Netflix, discussed the company's big infrastructure projects that give it more leverage over time than investing in manual processes.
Identity is now the first line of attack, so how can enterprises minimize their attack surface? Identity threat detection and response is a newly recognized cybersecurity solutions category. Sean Deuby of Semperis discusses ITDR and how enterprises can best take advantage of it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.