The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection.
Satti Charles, a Financial Crime Prevention Strategist with IBM Security Trusteer, is enthusiastic about the new behavioral biometric...
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
Satti Charles, a Financial Crime Prevention Strategist with IBM Security Trusteer, is...
Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories.
And because these attacks are going to continue to result in big headlines, cybersecurity is going to grow as...
Privileged users can be an agency's riskiest employees, as many have access beyond their roles or responsibilities. Moreover, current security platforms often fail to provide the necessary context to show if an incident is caused by an insider. What is your agency doing to address potentially high-risk employees and...
Forcepoint�� Stonesoft® NGFW earned a "Recommended" rating in the NSS Labs Next Generation Intrusion Prevention System (NGIPS) Comparative Report for overall security effectiveness, performance and TCO. Stonesoft outperformed IPS-only products while also providing next-gen/cloud-based firewalling, VPN connectivity,...
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
Building a threat intelligence team from the ground up can be riddled with political inertia. This whitepaper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats.
Discover the six core competencies that comprise a...
If ransomware has not already had a significant impact on your organization, it is most likely because you have simply been lucky...so far. Almost half of entities in the U.S. have been hit this past year alone and have lost not only money, but also reputation, IT hours and in some cases, total business functionality....
"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
In an interview about cybersecurity metrics, Olcott...
Plaintiffs suing Anthem Inc. in the wake of a cyberattack that exposed information on nearly 80 million individuals want a court to open the door to revealing more of the results of audits of the insurer conducted by the U.S. Office of Personnel Management.
How Effective Are Your Current Anti-Malware Tools for Keeping Endpoints Secure?
More than half of surveyed security leaders rate their organizations' current anti-malware protection above average or superior. And yet ...
54 percent say their organizations have experienced ransomware in the past year;
25...
A new audit that uncovered numerous problems with the U.S. Secret Service's IT management is "alarming," says House Oversight Chairman Jason Chaffetz, a victim of a Secret Service insider breach.
With comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.
"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.