Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data...
The internet of things (IoT) is exploding, and enterprise IoT is seeing massive growth as well. Every modern organization is using IoT devices to help run their business. Although IoT opens the door to unprecedented connectivity as well as innovative approaches and services, it also brings with it new cybersecurity...
This webinar will provide leaders inside and outside of contact centers with actionable recommendations and proven strategies to keep your organization and its' teams moving forward in our rapidly changing world.
Greg van der Gaast, head of information security at the University of Salford in the United Kingdom, has strong opinions on why some security investments aren't reaping maximum benefits. "We are addressing problems too far downstream," he says.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Measuring and communicating the value of a cybersecurity program is more important than ever. Colin O'Connor, COO of ReliaQuest, previews the topic for an upcoming virtual roundtable.
8 Steps to Shore Up Your Defense Against Cyberattack
In the past, it was easy to take mainframe security for granted. The mainframe was locked down behind closed doors, and even if you were able to get into the room, you'd still needed the coding experience to hack it.
Today, the mainframe is closer to the internet...
Hackers will always find novel ways to bypass your security protocols, and fighting cybercrime has become less about prevention and more about stemming the bleeding.
Ideally, if you can spot these indicators of attack, you can transform your organization's approach to data protection from reactive to...
It has been more than ten years since the security industry combined SIM and SEM into the industry standard today known as SIEM, and a wide gap still looms between this pragmatic approach to IT security across distributed systems and those of its mainframe counterparts.
Your sensitive data must be protected and...
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations, specifically attackers impersonating a trusted device could conduct...
Corporate culture can have a big impact on an organization's ability to achieve cybersecurity objectives, says Jessica Barker, chair of ClubCISO, a private members forum for European information security leaders, who provides insights on gauging an organization's security maturity.
The Web application attack landscape is evolving quickly in conjunction with the ongoing changes around application development, hosting and maintenance. Trends such as DevOps and cloud migration are forcing application security teams to investigate new ways to keep up with new vulnerabilities and to manage policies...
The cycle of planned update release schedules is outmoded and impractical. Instead, businesses have embraced agile workflows to be able to fix bugs, incorporate feedback from customers and implement new features on a daily or even hourly basis.
The mass Enterprise shift away from monolithic applications housed...
If your organization handles online transactions with European citizens the eIDAS Regulation presents significant opportunities, but also creates new requirements.
nShield hardware security modules (HSMs) play a vital role in helping to secure eIDAS-compliant solutions that require digital certificates, time...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.