Tag "Cyber Threat"

Back to homepage
Software

Should we be saying goodbye to SIEM and hello to SOAR?

Andy Kays, CTO of Redscan, explains to Information Age why SIEM vendors must leverage SOAR to improve threat detection and response.Security Orchestration, Automation and Response (SOAR) is a growing area

Software

Cyberwarfare: the danger and potential answers

Following comments by, Nick Carter, Chief of the Defence Staff, the most senior uniformed military adviser to the Secretary of State for Defence and the Prime Minister, Information Age quizzed

Industry Insights

What 9 Cybersecurity Research Reports Say About the State of Risk

Cybersecurity vendors and organizations put out a steady stream of research, sometimes in support of a product, but it almost always has something to say about the state of cyberthreats.

Hardware/Network

How to protect your organization from insider threats, the #1 risk for data loss

Is your security approach exposing your organization to risk? The answer is “yes” if your security strategy focuses exclusively on external threats. If the breaches of the last 24 months have taught

Industry Insights

Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security defenses to reduce dwell time. Fidelis Cybersecurity asked cybersecurity

Hardware/Network

Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

In December 2017, cyberattackers used TRITON/TRISIS malware to target safety instrumented system (SIS) controllers at a critical infrastructure organization. The malware was designed specifically to interact with the controllers, potentially

Industry Insights

6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts

When we talk cybersecurity awareness, the focus is almost always on employees and their operations. While a security-minded staff is indispensable and always the first line of a company’s cybersecurity

Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Hardware/Network

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that

Software

Email Still Poses a Cyber-Threat, but There is Hope

The total number of emails sent and received daily worldwide exceeds 281 billion and is forecast to grow to over 333 billion by 2022. Cyber-criminals have taken advantage of this