Real-world incidents prove over and over again that many of the most widespread issues still stem from a lack of basic cyber hygiene. This report looks at where organizations are falling on the basics and outlines steps for establishing a strong foundation for security.
Download this industry-leading report to...
Nearly two dozen security weaknesses in OpenEMR - open source electronic medical record and practice management software - left patient data vulnerable to cyberattacks before most were patched, according to the London-based security research firm Project Insecurity.
Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.
By 2020, 75 percent of all SIEM solutions will use big data and machine learning technologies to improve threat detection capabilities.
According to Gartner, SIEM solution purchases are primarily driven by threat detection use cases.
Download this report to learn more about:
Key findings across SIEM;
The FIN7 cybercrime gang regularly phoned victims, posing as buyers, to trick victims into opening phishing emails and attachments with malware, federal prosecutors allege. The group's success - 15 million stolen payment cards and counting - is one measure of how difficult these types of attacks are to block.
A WannaCry outbreak has hit unpatched Windows 7 systems at Taiwan Semiconductor Manufacturing Co., crippling its factories. The world's largest chipmaker, which traced the infection to a new software tool that it failed to scan for malware before installation, says the outbreak could cost it $170 million.
What the world needs now is Integrity
Established as part of the CIA triad, Integrity's certainly not new cybersecurity vocabulary. But it's the least understood. Integrity is about maintaining a desired state. File Integrity Monitoring (FIM) is the clearest example, but it's important to extend Integrity more...
With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift. You may be struggling to figure out how to secure this new class of assets and the environments they reside in.
Download this comprehensive whitepaper for guidance on:
How to think beyond securing just...
The chief security officer for the U.S. Democratic Party is recommending that all party officials avoid using mobile devices made by Chinese manufacturers ZTE and Huawei. Bob Lord says that even if devices from those manufacturers are free or low cost, no one wants to be the next "patient zero."
Businesses require better protection against malware and
DNS-based exfiltration. To identify the most significant
challenges to achieving a more secure enterprise, Ponemon
Institute - a renowned research center committed to privacy, data
protection, and information security policy - surveyed 604 IT and
Many companies that have adopted a layered security strategy
still fail to protect their Domain Name System (DNS)
infrastructure, a critical Internet protocol that was never
designed with security in mind.
Read this white paper to learn why integrating a DNS-based
solution with layered enterprise...
Assuming that every user, request, and server is untrusted until
proven otherwise, a zero trust solution dynamically and
continually assesses trust every time a user or device requests
access to a resource. But zero trust offers more than a line of
The model's security benefits deliver...
Cloud-based CRM giant Salesforce.com is warning some of its Marketing Cloud users that any data they stored may have been accessed by third parties or inadvertently corrupted because of an API error that persisted for six weeks.