The scale of the global IT security skills crisis is well documented. But what is its direct impact on cybersecurity with the government agencies of Washington, D.C.? Dan Waddell, Managing Director, North America at (ISC)² discusses the problem - and a new way to address it.
"Cloud security is one of the skills...
The insider threat is a dangerous risk to government agencies and their most sensitive data. Monitoring the behaviors internally and identifying corrupt situations based on access, roles and actions is not a luxury government agencies can afford to go without.
Read our detailed white paper on building a case to...
Privileged users are typically associated with a company's IT department and can include database administrators, network engineers, IT security practitioners, etc. However, across an organization there may be other privileged users that should not be overlooked. A privileged user can be anyone from account managers...
The term Insider Threat brings to mind the malicious employee, motivated by either money or politics to steal data that can be sold on a black market or used to damage the organization's reputation.
According to a Ponemon report, unintentional employee negligence severely diminishes the productivity of the...
When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and data, but they surely could contain it. Whether overtly or tacitly, leadership has now empowered its employees. Thanks to mobility, the cloud and other advancements, workers decide...
As a technology professional, you know that data, network and system failures aren't your biggest problems. It's the humans who interact with these systems that cause the issues.
High-risk insider threats - malicious, careless or negligent employees - are one of the main causes of data breaches. Most of the time,...
Ransom-based attacks are in the spotlight now, but Trey Guinn - head of solution engineering at CloudFlare - has discovered an interesting disconnect.
"There are more attackers sending out ransom notes than are actually doing attacks," Guinn says. "We have seen many of these ransom notes go out, but it's clear in how...
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control.
Rohit Gupta founded Palerra in 2013 with a vision of enterprises embracing the cloud. And that's happened. But with cloud ubiquity has come a new reality, he says.
"Enterprises recognize that there is a...
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether...
With attackers getting more sophisticated every day, manual methods
of locating and testing web-based apps are no longer enough. The
right Web Application Scanning (WAS) solution can help you
systematically: discover web apps running in your network, determine
whether or not they are vulnerable to attack,...
Data is the currency of the digital age and
the lifeblood of organizations, so strategies to protect
corporate data are growing in importance and are now
a topic of C-suite consideration.
In a recent survey conducted
by IDG Research Services, investing in cloud services
ranks as the second priority (55%)...
CISOs are facing some of the biggest challenges,
regardless of company size, with
fast-changing technologies such as cloud
and security risk growing at an exponential
Download this interview with Qualys CEO Philippe Courtot to gain his insight on:
The biggest challenges facing CISOs today
As technology proliferates beyond traditional
systems and networks into mobility and cloud,
the lines around securing such expanded technology
are becoming blurred. Security threats
are coming in from all angles, and IT must stay
ahead of any vulnerabilities before they occur.
Download this interview with...
As a mid-sized or smaller organization, there is a lure of feeling safety in
obscurity. "We're too small to be a target for cyber attacks" is a common refrain
used to justify a lax network security posture. Unfortunately, it's a refrain that
may come to haunt you.
The truth is your company doesn't have to be...
When web applications are breached, enormous amounts
of sensitive business data can be lost.
These types of attacks can occur at organizations
of all sizes and levels of IT sophistication, and can
affect tremendous amounts of data.
Web applications are popular targets because they are accessible to almost...