cybersecurity
Creating the security operations center of the future with Siemplify
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …
US data breaches surge, businesses and healthcare organizations hit hardest
The number of US data breaches tracked through June 30, 2017 hit a half-year record high of 791, according to recent numbers released by the Identity Theft Resource Center …
A UK business will spend more than £1m recovering from a data breach
A UK business would have to spend £1.1m on average to recover from a breach – more than the global average of £1m. An NTT Security study of 1,350 non-IT business decision …
Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …
Could e-discovery pros fill the insatiable demand for cybersecurity talent?
When looking at the cybersecurity industry from a jobs perspective, there is no denying demand for talent far exceeds supply. With many lingering vacant job requisitions, who …
BEC scams: How to avoid them and how to fight back
Phishing and spear-phishing emails are a constant threat to all users, but enterprises are positively inundated with them. “Most businesses will use a spam filter and …
Don’t let cybercrime hold your innovation to ransom
When things break, our natural instinct is to look for someone to blame. Why? Because nothing happens by accident. It’s either done on purpose, a casualty of neglect or lack …
Security analytics and operations are becoming more difficult
A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …
Constant availability: Mission-critical business data challenges
In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information …
What will it take to improve the ICS patch process?
While regular patching is indisputably good advice for IT networks, one of the main takeaways from the Petya and WannaCry attacks is that a lot of companies don’t do it. And …
Getting the most out of your SIEM investment
Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These …
Businesses overconfident about keeping attackers at bay
Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies