One of the first steps to creating a
vendor risk management program
includes identifying what kind of
access your vendors have to your
network and where your greatest
risks lie. Unfortunately some organizations dwell on identifying those risks rather than remedying them.
Download this whitepaper to explore...
Upper management doesn't always buy
in to or fully understand the importance
of a vendor risk management program.
Download this whitepaper for expertise on how to properly communicate the
risk (and management of that risk) in
a way that executives can understand
The Q2 2015 State of the
Internet-Security Report builds on the significant changes
made in last quarter's report. In this edition, attack data
previously published in the classic State of the Internet
Report is combined with the data previously published in the quarterly
Prolexic DDoS Attack Report. The two...
Relationships with vendors are
important (or even vital) for many
organizations, but unfortunately,
there's a trade-off - the more data you
share, the more risk you acquire.
It is extremely difficult to measure
the security posture of each of your
vendors, let alone create objective
metrics around those...
Protected health information, financial data and other sensitive corporate
information are exchanged regularly, as companies communicate throughout
the day to patients, customers, business associates and vendors. Email
encryption can be used to protect sensitive data in transmission, but what if
email shouldn't be...
Corporate spending on IT security reached a record $71 billion in 2014 and is predicted to increase another 8% in 2015. With an accelerated increase in spending on cybersecurity, year over year, you would think companies are winning the battle against cybercriminals - but they're not. It's becoming clear that...
To stop threats, you first have to see them coming.
Today's cyber threats are increasing in volume, diversity and sophistication, rapidly outstripping the ability of point security solutions to safeguard critical data, applications and systems. Network-based security replaces these vulnerable point solutions with...
Threat intelligence is only useful if you can take action quickly to protect networks,
systems and data. It is not a question of receiving intel on attacks, but rather: What data should you use to find
indicators of critical security threats?
Today, none of us are immune to the impact of botnets on...
As security requirements and cyber
threats keep evolving, network-based
security that relies on monitoring
command and control servers, suspect
sites and IP addresses, and Netflow
sessions, as well as looking for unusual
activity, brings many benefits. In
particular, network-based security
It's over 25 years since the first PC viruses appeared. Since then the nature of the threat has changed
significantly and today the threats are more complex than ever before.
Download the Practical Guide 'Navigating the Threat Landscape' to discover:
Insights into the current state of threats
Do you know the most common risk factor for corporate cybercrime? Employees. Sometimes, the threat actually originates from within, when employees' ignorance and/or negligence opens the door for cybercriminals.
This eBook is designed to provide you with tips for educating your employees
about cybersecurity. It's...
In the first six months of 2015, the number of crypto-attacks equaled the volume experienced in all of 2014. This increase illustrates how widespread this problem is becoming for businesses of all sizes. It is entirely possible that you or someone in your company will be held ransom by a cryptor at some point- a...
APT attacks have led to breaches at some very high visibility targets and have caused substantial damage. This notoriety of APTs has given rise to an entire new class of security solutions that are supposedly purpose built to combat APT attacks. Unfortunately, with all the buzz, it is sometimes difficult to separate...
Financial institutions have long been a favorite target of criminals. Technology has changed the game and added more threats for the financial services (FS) industry. Today's "bank robbers" are looking for more than just cash and need never set foot inside a brick-and-mortar establishment to get what they are looking...
The news has been full of attacks on retailers. Target, which lost the data of more than 100 million customers, is just the highest profile example. Although tiny in comparison to Target, the attacks on Neiman Marcus and Michael's Stores also affected about four million customers.
In this white paper, we...