During a video interview with Information Security Media Group, FireEye's SVP and COO, Kevin Mandia, details the three stages of advanced threats; attractive nuisances, criminal activity, and nation-state activities.
During a video interview with Information Security Media Group, David DeWalt, CEO of FireEye, discusses what is wrong with the market today, and how it can be fixed.
During a video interview with Information Security Media Group, FireEye's David DeWalt, CEO, and Kevin Mandia, SVP and COO, discuss the new security model, and how to effectively prevent against cyber-threats.
Watch this 6-minute video highlighting what the global leader in strong authentication, RSA, has done over the years and continues to do to maintain the number-one spot in the security industry.
The rise in usage of mobile devices has also come with a commensurate rise in application risk. View this webinar to find out how to make mobile app security a priority and tame the chaos.
NIST information risk guru Ron Ross, in a video interview, previews new guidance from the National Institute of Standards and Technology that's aimed at helping organizations architect their IT infrastructures to be secure from the get-go.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
Rick Howard, CSO of Palo Alto Networks, has a new idea for security pros: the cybersecurity canon of books every cyber pro must read at least once in their careers. Which titles make the list?
White House Cybersecurity Coordinator Michael Daniel assesses the cyberthreat environment facing the nation and explains what the federal government is doing about it.
With a decade under its belt, ENISA enters 2014 with a mission to improve cybersecurity across Europe by collaborating with companion agencies around the world, says Executive Director Udo Helmbrecht.
In the third full day of RSA 2014, ISMG's editors record exclusive video interviews with Michael Daniel of the White House and Udo Helmbrecht of ENISA. What are the common themes of these discussions?
Imagine if an organization received a cybersecurity rating - just like an individual receives an objective credit report. This is the new model promoted by Stephen Boyer and his company, BitSight.
Cybercrime. Privacy. The power of big data and mobility. These issues are as challenging to India as they are to any global region. Vinayak Godse of DSCI discusses his organization's role in improving cybersecurity.
The threats, attacks and crimes don't differ greatly around the world. What does differ is how each region responds. Freddy Dezeure of CERT-EU is working to ensure that Europe is ready to respond appropriately.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.