Starwood Hotels, which operates well-known hotel brands such as Westin, Sheraton, W Hotels and Le Méridien, said Friday that hackers had infected point of sale payment systems in some of its locations in North America.
Adversaries can exploit digital shadows to reveal weak points in an organization and launch targeted attacks, but some digital shadows can prove advantageous to your organization; the digital shadows of your attackers.
IT practitioners must learn to think, and communicate, like a board member. One opportunity for security leaders and CISOs to showcase their executive skills comes in the form of defending their budgets.
It has become very clear that intrusion detection and intrusion prevention are not simply deployment options of the same technology. They are in fact separate disciplines with unique requirements, goals and roles in the security stack.
Everyone is talking about the shortage in security talent. Literally, everyone. It’s not for naught though, when you look at the sheer volume of open positions out there. We must have a talent shortage, right?
The broad reach of GRC solutions creates a unique set of deployment challenges from both a technical and business perspective. This raises the question – how can organizations avoid common GRC pitfalls?