The endpoint security market continues to expand with vendors old and new marketing their solutions as "next-generation" game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture....
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and...
For organizations that are embracing cloud and virtualized environments, three common-sense steps are proving to be key for providing the visibility and control needed to maximize security across modern IT environments.
Download this eBook to learn how you can implement these steps in your organization.
VMware...
Email is the most used communication tool in the business and the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can be an easy way to secure sensitive corporate data, avoid breach costs and meet regulatory obligations.
Download this eBook to discover:
The...
Traditional responses to managing privileged and identity access often leave companies exposed because their focus is too narrow.
Download this eBook to learn how your organization can revamp its PAM strategy by:
Identifying blind spots in privilege sprawl;
Rethinking third-party access;
Adopting a new approach...
Blockchain technology already underpins the boom in cryptocurrencies, but it is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.
In addition to addressing the risk related to identity management for credentials, organizations must also consider how all types of privileged access impact their security posture.
Download this whitepaper to:
Learn why protecting remote access pathways is critical;
Understand what to consider when securing...
In 2014, the Department of Defense (DoD) issued instructions that replaced DoD Information Assurance Certification and Accreditation Process (DIACAP) with the Risk Management Framework (RMF). The RMF is designed to be managed as a continual process as the risk posture evolves over time for each information...
The fact that Federal agencies are prime targets for the most sophisticated cyber threats is undeniable. If cyberattacks are inevitable, then robust capabilities for security investigation, threat hunting, and rapid response are essential. Government cybersecurity professionals require visibility across their silos of...
Protecting 4 million patient records from breaches takes a multifaceted approach, says Bredai "Dai" Snyder of Care Coordination Institute, who describes three of the most critical elements.
The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses also must evolve.
In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening inside an...
Micro-segmentation is fast becoming a foundational layer of the security architecture for today's data center and cloud computing environments. It has seen a big push by a range of vendors as well as growing recommendations from leading analyst firms such as Gartner, ESG, and the 451 Group.
The idea of using network...
As of January 1, 2018, all SWIFT customers must self-attest to their compliance with the new SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations that began with the Bank of Bangladesh breach back in February 2016 and has swept across the...
People are always the weakest link in security, but the stakes are higher now because of the massive amounts of sensitive information accessible online and the determination of cyberattackers. The standard username/password approach is no longer enough.
Because of this, government agencies are starting to realize...
True "next-generation" multi-factor authentication (MFA) platforms should be well equipped to manage the customer experience while providing the right level of security assurance at the right time, anytime.
Download this e-book and learn ten criteria to look for in a robust MFA platform, including:
Decentralized,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.