Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.
The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from organisations primarily in professional services (37%)
and financial services (32%), but also in retail, utilities and manufacturing, mainly with...
Given that budgets and time are finite, how can organizations best identify if their information security strategy is well balanced and appropriate? Nandhini Duraisamy, chief operating officer of Quadron Cybersecurity Services, shares best practices.
Because a relatively small number of individuals provide the vast majority of services and infrastructure that power cybercrime, they remain top targets for arrest - or at least disruption - by law enforcement authorities, says cybercrime expert Alan Woodward. But of course, geopolitics sometimes gets in the way.
The U.S. Cybersecurity and Infrastructure Security Agency is creating the Joint Cyber Defense Collaborative to build a national cybersecurity defense strategy based on collaboration between the public and private sectors, CISA Director Jen Easterly said at the Black Hat 2021 conference Thursday.
Are you tasked with starting or improving the security processes within your organization?
Expel’s CISO, Bruce Potter, provides tips on how to do more with less, or improve a less-than-stellar legacy program.
Evaluating MSSPs? Expel has accumulated a list of questions to ask during the evaluation process.
Here are 12 best questions you should consider asking any potential provider to help you determine which provider is the right fit for your organization.
Ransomware attacks are on the rise but it doesn't mean it's time to panic.
Expel’s SOC team shares tips on what you can do to keep your organization safe and stay resilient against these types of attacks.
Are you in the process of selecting endpoint, network, or SIEM security products? Expel has the expertise you can rely on during the evaluation process.
Expel’s CISO, Bruce Potter, provides insights on budget planning when determining your security spend.
While some organizations are improving their ability to share threat intelligence with other entities within the same sector, cross-sector cyber info collaboration is still often a hurdle. But cyber fusion centers can help to automate that process, say Errol Weiss of the H-ISAC and Anuj Goel of Cyware.
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
In a video...
It was stealthy, and it was widespread. But perhaps the Kaseya VSA ransomware attack wasn't quite as effective and damaging as initially feared, says Michael Daniel, president and CEO of the Cyber Threat Alliance. He explains where defenses succeeded.
The Department of Health and Human Services needs to improve collaboration among several of its internal entities, as well as with external partners, in order to bolster cybersecurity threat intelligence sharing in the healthcare and public health sector, says a watchdog agency report.