cybersecurity Tag

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they...

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This...

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and...

In today's cybersecurity environment, it's not if you'll be breached, it's when. Do you know how to respond to minimize damage, maintain brand strength, and shut down the intruders? This interactive Webinar walks participants through a step-by-step process for crafting an effective cybersecurity incident response...

HBO has confirmed that the company's internal sites have been broken into, and  that proprietary information (including reportedly scripts of upcoming episodes of the hit series "Game of Thrones") have been seized. According to an article in Variety, “HBO recently experienced a cyber incident, which...

Although traditional models of separation of duties are incompatible with DevOps, the principle can certainly be applied--and must be, in the long term. Separation of Duties: The Boogieman? Today in an interview for our Cloud and Network benchmark, the IT professional on the other end of the...

"You are in a maze of twisty little passages, all alike." That's the phrase that kept running through my head as the folks from Acalvio prebriefed me on Deception 2.0, the second version of the company's advanced threat defense technology. The basic premise behind the company's...

As pretty much everyone on the planet knows by now, last week when footage of a passenger being forcibly removed from his seat by security at the request of United Airlines went viral, United's stock price imploded, slashing the company's market capitalization by $800 million....

The past few weeks have seen a spate of infrastructure-related cybersecurity vulnerabilities. On March 8th,  Apache released a critical vulnerability alert (CVE) regarding a significant vulnerability in its Struts 2.0 opensource enterprise Java framework, which is widely used in enterprise deployments.  The vulnerability permits remote code execution (RCE) in the framework; recommended mitigation strategies include upgrading the framework or changing implementations.

Infosec professionals are well familiar with the phenomenon of Transport Layer Security (TLS) interception. For everyone else, some background: TLS is the successor to SSL, once the default encryption protocol. TSL provides the underpinnings for many common security protocols, including secure HTTP (HTTPS). Protocols like TLS...