cybersecurity

Can existing endpoint security controls prevent a significant attack?
Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs. A majority of the …

Cyber risk assessment and disclosure requirements: What’s important to you?
In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …

$8.76 million: The average yearly cost of insider threats
According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organizations,” the average cost of an insider threat annually is $8.76 million. It’s …

Are your organization’s key assets at risk?
A new study conducted by the Ponemon Institute shows increases in threats and awareness of threats to knowledge assets, as well as improvements in addressing those threats by …

SOCs require automation to avoid analyst fatigue for emerging threats
A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful …

How many threats hit the mainframe? No one really knows
Mainframes are the definition of mission-critical for countless businesses. Mainframes can run 1.1 million transactions per second and are at the core of the technology …

Solving the dark endpoint problem with increased visibility and control
In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …

Largest inhibitor of cyber insurance market growth? Silent cyber risk
A new study of the UK cyber risk insurance and broker community reveals startling findings. First and foremost, the insurance industry needs to address non-affirmative cyber …

Cybersecurity task force addresses medical device safety
In an effort to harmonize the work being done in hospitals and by device manufacturers to address medical device vulnerabilities, Vizient has formed the Medical Device …

Expand vulnerability and risk management programs to eliminate security misconfigurations
In this podcast recorded at RSA Conference 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses how expanding vulnerability and risk …

GDPR: It’s an issue of transparency
The General Data Protection Regulation (GDPR) has been on the lips of security professionals for a long time now – but in just over a month, it will become a reality. While it …

Most dangerous attack techniques, and what’s coming next
Experts from SANS presented the five most dangerous new cyber attack techniques in their annual RSA Conference 2018 keynote session in San Francisco, and shared their views on …