Too many companies lack an understanding of the business ramifications of cyber threats, says Juanita Koilpillai, president of the Digital Risk Management Institute. In a video interview, she describes why business owners and insurance companies must work together to develop modern cyber risk management programs.
In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy. How is the threat landscape changing? And how should companies defend...
In this second video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the evolution of technological capabilities to defend organizations against increasingly complex cyber attacks.
In this third video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, sits down with Securonix CEO Sachin Nayyar to discuss today's insider threats.
The Senate on Oct. 27 passed the controversial Cybersecurity Information Sharing Act of 2015, which provides businesses with liability protections if they voluntarily share cyber threat information with each other and the federal government. The bill now must be reconciled with House measures approved earlier.
In this final video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the role of Government in the ongoing cyberwar.
Cyberattacks are challenging our current methods of defense, says Lance James, a global cyber intelligence adviser at the consultancy Unit 221b. In a video interview, he discusses the changes in tools and skills that must be made to fend off fast-moving adversaries.
A third data breach affecting TalkTalk has prompted sharp questions from U.K. public officials about whether stronger breach notification laws and breach-related penalties might help prevent more such incidents from occurring.
Everyone's talking about business email compromise, but what they aren't talking enough about is what's at the root of these attacks - spear phishing. Joseph Opacki of PhishLabs discusses how security leaders must respond to the threat.
Despite the focus on external cyberattacks, insider attacks are almost as common and can potentially cause significantly more damage, says Michael Theis of Carnegie Mellon's CERT Insider Threat Center. In a video interview, he describes how science-based models can help organizations fight the battle from within.
HP has agreed to sell its intrusion detection and prevention software unit TippingPoint to security vendor Trend Micro for $300 million. But analysts say Trend Micro faces stiff breach detection and incident response competition.
Someone green-light this drama: Sony, after suffering a massive data breach that led to the leak of personal information and embarrassing corporate emails, has agreed to a data-breach settlement worth up to $8 million.