With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise.
Hi, what are you looking for?
With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise.
While often relegated to a purely functional role, DNS offers unparalleled opportunities for preemptive defense against cyberattacks.
As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.
Because you can’t secure what you can’t see, having real-time asset visibility across the network is vital to maximizing security, minimizing risk, and protecting...
Consumer IoT devices will increase the threat to commercial, government, healthcare, educational, and other organizations.
Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to...
If you’re a film buff like me, you’ve probably seen The Imitation Game, with Benedict Cumberbatch in the role of Alan Turing. The movie...
"Adversaries have to build a kill chain. We're not trying to prevent every aspect of that chain, just snap one of those links."
The information security space is a hot, fast-moving market; and with that heat and speed comes both good and bad.
In 2013 I wrote a Security Week column on how security automation and orchestration was a vital and foundational feature in a cloud
“You are chained,” said Scrooge, trembling. “Tell me why the chains bind you.” “I wear the chains I forged in life,” replied Marley. “I...
Earlier this month, during the RSA Conference in Europe, Amit Yoran President of RSA and former cybersecurity director at the U.S. Department of Homeland...
My daughter is still at an age when her imagination kicks into high gear when the lights go out. Sometimes those runaway thoughts get...
Cyber extortions have taken on multiple forms – encrypting data and holding it hostage, stealing data and threatening exposure, and denying access to data.
2014 was a terrible, horrible, no good, very bad year for cyber attacks.
For far too long, the conversation around cloud and security has revolved around Shadow IT, the use of cloud applications that IT doesn’t know...
In 1880, John Venn, a logician and mathematician born in Hull, England, developed what is now known as the Venn diagram. His goal was...
The blogosphere was atwitter last week with scintillating details about nude selfies and what you should and shouldn’t be doing with your phone. Blame...
Over the last year or so, the “Cloud Access Security Broker” market, as defined by Gartner, has exploded (451 Research calls it the “Cloud...