Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.
Cloud-native SIEM dramatically simplifies deployment and management, and increases ease of use, speed, and detection accuracy. Cloud-native SIEM is also highly scalable, efficient, and cost effective. As organizations grow, merge, and evolve, cloud-native security solutions can offload the costs of hardware and...
Unlike other types of security threats, insider threats are complicated because only a few are caused intentionally, and they typically involve valid credential use. Beyond full- and part-time employees, insiders include contractors, vendors, customers, interns, and others who can be working on site or remote....
In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.
Strengthening cybersecurity is the # 1 priority for IT departments and infrastructure decision makers worldwide. A multi-layered 3-2-1-0 data protection strategy provides rapid recovery, protection against cyberthreats, data loss, and local disasters, and designing a proper approach can minimize your risk. Join Eric...
Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
Prioritizing which parts of your business need to be fixed first is daunting and your day is likely preempted by account lockouts, breaches making headlines, and simply trying to answer your CEO’s questions, like “are we secure” and “how do we know?”
Join this panel as we discuss how to use cloud-native...
The speed at which we're seeing ransomware attacks has increased dramatically in the last couple of years - and it's only getting faster, warns Mary O'Brien, general manager, IBM Security. Ransomware deployment has increased from three months to four days on average.
According to this year’s SANS Threat Hunting Survey, threat hunting resourcing is an “ever-growing staffing nightmare.” 73% of this year’s respondents claimed that their biggest challenge is finding skilled staff. This is a 7% increase over 2022, and a whopping 43% increase over 2021.
This talent drought...
Organizations often face challenges when they aim to build sustainable security programs at scale. Anna Westelius, director of security engineering with Netflix, discussed the company's big infrastructure projects that give it more leverage over time than investing in manual processes.
Identity is now the first line of attack, so how can enterprises minimize their attack surface? Identity threat detection and response is a newly recognized cybersecurity solutions category. Sean Deuby of Semperis discusses ITDR and how enterprises can best take advantage of it.
It's getting harder to distinguish between normal and unusual threat activity, with more sophisticated attacks exacerbated by hybrid work and, soon, AI attacks. Defenders need correlated rather than isolated telemetry to get more signal and less noise, say Jeetu Patel and Tom Gillis of Cisco.
Cybersecurity is forever a growing concern for organisations of all sizes. The challenges include a spike in threats, the evolving technology landscape that increases the threat surface, the impact of regulation, too many isolated point products, and a lack of skills and budget for adequate defence.
Companies are...
Mandiant's 14th edition of M-Trends has been released, offering a comprehensive and insightful examination of the constantly evolving cyber threat landscape. Drawing upon Mandiant's extensive experience in incident response investigations and threat intelligence analysis, the report delves into high-impact attacks and...
This annual report shares the most significant data from our security operations center (SOC) in our threat detection and response efforts. It curates that data into trends that can impact your cybersecurity posture and offers resilience recommendations to protect your organisation and what to expect in 2023.
In this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.