Blog Archives

Waratek Combats Zero-Day Exploits with Virtual Patching

Defeat Zero-Day Exploits BEFORE they Become a Breach

Each Zero-day combating security patch issued by Oracle, Microsoft, IBM, Apache or any software developer starts a relay race. One team is the malicious hackers who exploit new flaws to steal valuable data or take control of an important process.
The other runners are application security and development teams who need weeks,

Read more ›

Posted in Cybersecurity, Layered Defense, Zero-Day Exploits
Tags: , , , , ,

Cyber Threat Intelligence

How to Intelligently Share Cyber Threat Intelligence

A lot has been written on the importance of information sharing in the cybersecurity community. There is seemingly an ISAC for every industry these days.

Read more ›

Posted in Cybersecurity, defense intelligence, Layered Defense
Tags: , , , ,

Adaptive Multifaceted Cybersecurity

Cybersecurity Must Adapt to Today’s AND Tomorrow’s Threats

The RSA Conference last February brought together 40,000 of the brightest minds in cybersecurity, along with their products, promises and predictions.

Read more ›

Posted in Cybersecurity, Incident Response, Layered Defense, Risk Management
Tags: , , , , , , ,

Approaches to Cybersecurity

Taking a Multifaceted Approach to Cybersecurity

By Samuel Greengard  |  Posted 2016-09-20 | Baseline – Cybersecurity

As the threat landscape grows, there’s a need to take a proactive approach that incorporates multilayered security,

Read more ›

Posted in Cybersecurity, Data Security, defense intelligence, Layered Defense, Risk Management
Tags: , , , , , ,

Cyber Risk Oversight

How do you measure how well your organization handles cyber risk? How healthy is your organization’s approach to cybersecurity governance?

Posted in cyber risk, cybergovernance, Layered Defense, Risk Management
Tags: , , , , ,

Holistic Cybersecurity through Cyber Analytics

Achieving Holistic Cybersecurity in Government and the Enterprise through Cyber Analytics

To be effective in their security efforts, agencies and enterprises must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.

By John Lainhart, Christopher M. Ballister | May 12,

Read more ›

Posted in cybergovernance, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , , , , ,

Cyber Risk – Part 1

The Size and Shape of Cyber Risk – Part 1

by | Mar 7, 2016

Cyber risk has no obvious shape or size. That’s why it’s such a thorny problem – it is exceedingly difficult to pinpoint factors that drive risk.

Read more ›

Posted in attack surface, Cyberattack, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , ,

Cybercrime Impacts Retail Security

Retail Security: Cyber Tech Fuels Cybercrime

By Matt Pillar, senior executive editor, Innovative Retail Technologies

March 2016 Innovative Retail Technologies

In a post-EMV world, retail security experts are bracing for malice, menace, and misfortune to go digital.

Read more ›

Posted in attack surface, Compliance, Content, Customer Engagement, Cyberattack, Cybersecurity, Data Security, Fraud, Hacks, Incident Response, Layered Defense
Tags: , , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

Universal Model of Cyber Risk – Part 4

A Universal Model for Assessing Cyber Risk Part 4: Toward a Universal Cybergovernance Model

by | Dec 28, 2015 | for Cybergovernance Journal

Part 1 examined how the increasing incidence of cyber breaches is bringing significant pressure on corporate directors to assume more oversight of cyber risk In Part 2 we contrasted the rise of cybergovernance (cybersecurity governance) with the history of financial governance following the passage of the Sarbanes-Oxley Act.

Read more ›

Posted in cybergovernance, Cybersecurity, Hacks, Incident Response, Layered Defense, Risk Management
Tags: , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: