Issue highlights 1. Reporting cybercrime feels like 'Groundhog Day' 2. Study: Firms not ready to respond to complex threats 3. Having 'the ear of the CEO' is key to battling cyberthreats 4. Key management is the biggest pain of encryption 5. Fox-IT releases answer to NSA's 'Quantum Insert' attack 6. IDG Contributor Network: Are we witnessing a cyber war between Russia and Ukraine? Don't blink - you might miss it |
Resource compliments of: Intersect Alliance International Every miscreant, hacker and disgruntled employee is gunning for your information. One of the easiest and most powerful ways to deal with malicious threats; rethink your SIEM. Beyond just collecting logs, you can now have real-¬time information and alerts, easy to use reporting and decision support for taking action. Download your guide |
Top-tier security journalists say if those in the industry want coverage, they can't pitch what everybody else is pitching. READ MORE |
Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA. READ MORE |
Resource compliments of: IT Roadmap Boston The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and five focused pillars of technology learning that are the most critical for the year ahead. Register Now! |
Former FBI director stresses the importance of an enterprise-wide approach to cybersecurity, while Congress considers legislation to promote sharing threat information. READ MORE |
Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute. READ MORE |
Webcast: Oracle Join us on Wednesday, May 6 at 2:00 p.m. EST for a live discussion with industry experts. Learn More |
A couple of years ago, among the trove of documents released by Edward Snowden, there was information about a "man-on-the-side" attack called Quantum Insert. READ MORE |
The term "cyber war" is often misused and misunderstood, but there is a clear and concise definition with a high bar of what constitutes one. The ongoing War in Ukraine, also known as the War in Donbass, meets the standard of cyber warfare, due to cyber attacks accompanying and tied to military actions and objectives. READ MORE |
White Paper: Imperva Firewalls don't provide sufficient protection for most public-facing websites or Web applications. Learn how Web App Firewalls help security leaders better protect data and apps in their organizations. View now |
|
0 comments:
Post a Comment