Top Russian diplomat Andrei Krutskikh is pressuring the U.S. to back down in cyberspace after the director of U.S. Cyber Command, Army Gen. Paul Nakasone, acknowledged America has conducted a "full spectrum" of virtual operations in support of Ukraine.
According to Gartner, continued increases in the volume and success of phishing attacks and migration to cloud email require a reevaluation of email security controls and processes.
Download the 2021 Gartner Market Guide for Email Security to learn:
What integrated cloud email security (ICES) solutions are and...
As more devices connect to networks, keeping track of them all is job number one. What is connected? Are those devices vulnerable? Where do they communicate? Who can access them? What active threats are out there? It's confusing to say the least. To clear this confusion, you need to make sense of all your XIoT. Each...
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Typically, managed detection and response is associated with endpoints, but it is actually so much more, says Rick Miller, chief operating officer of GoSecure. He discusses incident reposnse roles, what to look for in an end-to-end MDR solution and what to ask an MDR provider.
Cyber adversaries are embracing defense evasion, triple extortion, wiper malware and the accelerated exploit chain, and that is significantly reshaping the threat landscape that CISOs have to deal with, according to Derek Manky, head of Fortinet's FortiGuard Labs.
In today's dynamic environment, with the proliferation of a wide array of different security products and the high chance for misconfigurations, testing security is more imperative than ever, says Scott Register, vice president of security solutions at Keysight.
What are the top five security activities that lead to the best outcomes, and why do they work so well? Those critical issues were closely examined in a recent study commissioned by Duo Security/Cisco, says Helen Patton, advisory CISO, who discusses the findings.
Greg Murphy, CEO of Ordr, says there are three topics healthcare senior leaders and board members keep asking about: ransomware, ransomware … and ransomware. He discusses how healthcare entities are addressing their biggest threats, IoT devices, and the implications of the PATCH Act.
The world is a much different place since the previous in-person RSA Conference - and so is the cybersecurity marketplace. Alberto Yépez of Forgepoint Capital shares his view of the state of the industry and the market forces that may cause further change in 2022.
Art Coviello, former CEO of RSA and current partner with Rally Ventures, describes the cybersecurity industry trends he's watching closely as we hit the midway point of 2022, as well as which emerging technologies have not quite evolved in the way he might have anticipated.
As the dwell time between when hackers compromise a system and when they trigger a ransomware attack has grown, victims have a little more precious time to detect and stop these attacks "before the worst happens," says Chet Wisniewski, principal research scientist at Sophos.
In 2021, check transaction volumes increased by 8%, while attempted fraud dollar value increased by 106% for checks *. Check fraud risk is not only alive and well, but a growing concern for Fraud Managers.
To combat check fraud, Financial Services Organizations (FSOs) need both external account verification tools...
MLH Clinical Engineering (CE) Department, located in Memphis Tennessee, treats 400,000 patients annually at 6 hospitals and over 100 primary care, specialty clinics, and surgery centers across the region. Their system has 13,000 associates and 2,400 providers.
Faced with a growing challenge of protecting and...
The challenge: Universal Health Services, Inc. is one of the nation’s largest healthcare providers, with nearly 90,000 employees and almost 400 unique sites across 39 states. With hundreds of thousands of connected devices being tracked manually in error prone process, leading to major inconsistencies and lack of...