Marissa Mayer bids adieu to Yahoo as Verizon completes its acquisition of the company for $4.48 billion - a $350 million discount gained after the search giant last year revealed that it had suffered two massive data breaches.
A recent study rates the cybersecurity performance of Fortune 1000 enterprises. Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, there really isn't a decrease in the number of reported incidents.
Download this whitepaper to...
A discussion that explores the predicament many information security managers face when deciding which security technologies to buy in a glutted market leads the latest edition of the ISMG Security Report. Also: An update on cyber flaws in connected vehicles and the latest from Infosecurity Europe.
The annual Infosecurity Europe conference returns to London this week, offering discussions of the latest information security practices, procedures and technologies as well as deep-dives into privacy, cybercrime, policing, surveillance, GDPR and more.
Cybersecurity professionals believe that technology integration, collaboration between cybersecurity and IT
operations, and tight alignment between cybersecurity and IT operations frameworks are important components
for incident response performance. However, incident response has become more difficult over the past...
Security professionals think in terms of risks and threats to ensure that the right security measures are deployed in the right places and to a proper degree. Security teams need an evaluation process to help them determine whether an object is under-protected or over-protected, but traditional security assessment...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Every day, your employees - usually accidentally - create vulnerabilities that create opportunities for data breaches. You must balance risks with giving employees the access they need to succeed. While cloud apps and BYOD policies are known to increase user productivity & lower operating costs, they are also...
Organizations around the world are being targeted by ransomware attacks like never before...
But rather than suffer a data destruction or business disruption incident, many are paying the ransom. That's no solution. It's costly and comes with no guarantees of the safety of your data or systems. Perhaps worst of all,...
A new phishing site just popped up targeting your online banking customers. Many of your end users who land on the page won't realize they're about to disclose their login or payment card information to fraudsters.
How can you help your customers before they disclose their credentials?
Download this whitepaper...
PSD2 both presents opportunities and introduces new requirements for banks. Proactive, early-adopting organizations will be able to meet the new demands rapidly. By creating new alliances and providing innovative services, they will be able to provide value for both themselves and their customers.
Download this...
A RedSeal-72Point study of 200 CEOs about their perceptions of cybersecurity posture discovered that many are dangerously unrealistic about how vulnerable they are. In fact, more than 80 percent displayed "cyber naiveté," allowing their organizations to be exposed to cyber-attack.
This study reveals the...
Hardware-centric networks are not able to keep up with the demands of business today, not to mention the growing security threats that exist. Read this solution overview to discover how implementing a network virtualization solution for your business will make your life easier.
Enable networking and security at...
The security landscape has shifted significantly for financial services organizations. And now they must use digital transformation as the impetus to evolve their cybersecurity strategies, says Bruce Roton of Level 3.
Roton, Level 3's Senior Director of Security Solutions Architecture, sees the impact of digital...
As organizations struggle to deal with the rising security demands associated with complex networks and myriad, ever-mutating external threats, it's imperative to ensure that the right endpoint security solution is in place. This means complete endpoint security that provides full cycle protection that includes...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.