If your organization is about to
embark on an M&A process, brace
yourselves: your vulnerability to
attack is about to go up, and
cyber-criminals are likely to be
doubling their efforts to capitalize
on this window of opportunity.
Download this whitepaper to learn more about:
How M&A is an opportunity for...
For nearly 30 months, internet traffic going to Australian Department of Defense websites flowed through China Telecom data centers, an odd and suspicious path. Why the strange routing occurred is known. But the reasons why it persisted for so long aren't.
The United States will soon officially have a single agency that takes the lead role for cybersecurity. Congress has passed legislation to establish the Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security. The measure awaits President Trump's signature.
CrowdStrike® Falcon Discover™ on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more.
Watch this on-demand webinar. You'll see how CrowdStrike Falcon Discover can help your security...
Google is investigating an unorthodox routing of internet traffic that on Monday sent traffic bound for its cloud services instead to internet service providers in Nigeria, Russia and China. Security experts say border gateway protocol is to blame and no easy fix is in sight.
The security operations center (SOC) faces mountain challenges: lack of personnel, disparate security tools, multiple alerts that must be run down, prioritization of alerts and the transition between incident detection and incident response.
Security affects and is affected by operational and IT considerations....
One of the biggest challenges facing IT ops in agencies today is the lack of visibility across the entire infrastructure.
Download this report by Gartner to learn the four-step approach to developing an IT operations monitoring strategy.
As the modern attack surface rapidly expands, companies must get the basics right. Yet each time a data security breach hits the news, there are reactionary questions are what could have been done to avoid the problem. More often than not these incidents occur because organizations commonly overlook basic security...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. In fact,
the perimeter has mostly disappeared. We are living in a new reality, one crowded with new types of dynamic IT assets.
it's discovering short-lived assets like containers, assessing the state of cloud...
Georgia quietly fixed two flaws in its voter registration website that could have exposed personal information. How the secretary of state's office discovered the flaws and reacted suggests it may have erred when making a sensational accusation against the Democrats on the eve of the U.S. midterm elections.
Georgia's Republican gubernatorial candidate has accused the state's Democratic Party of attempting to hack the state's voter registration database. The accusation, from Brian S. Kemp, is complicated by his also being the state's current secretary of state, supervising election infrastructure and security.
The latest edition of the ISMG Security Report features Kevin McDonald of the Mayo Clinic discussing how to secure connected medical devices. Plus, updates on the indictments of Chinese agents for hacking and the unveiling of the Financial Services Sector Cybersecurity Profile.
Critical National Infrastructure refers to the various systems, networks, facilities and services upon which daily life depends. One such infrastructure is our power networks that are responsible for providing us with electricity that has become central to the ability of modern societies to function. Apart from being...
Building Security in Maturity Model, BSIMM: What is it and How Your Organization Can Leverage the Data
Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts...
Benchmarking your software security initiative can tell you if you are keeping pace with your peers, or if you should accelerate your efforts to rise above the competition. The results of a benchmarking assessment can help you identify new security strategies and prioritize scarce resources to be most effective....