Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such as risky employee behavior and cloud security.
UK-based TalkTalk, a telecommunications and broadband company, confirmed that it has suffered a data breach, which names, phone numbers, addressees and account numbers of its customers were exposed to malicious actors.
Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said.
Register for this webcast to learn how you can align, automate and enforce controls to security and compliance policies - while providing visualization, workflow and reporting critical to improving operational efficiency and reducing audit costs.
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.
In resource-limited environments, every alert counts. Spear alerting is an approach that can help organizations improve their signal-to-noise ratio and make their security programs much more efficient and effective.