betakit
Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly…
Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security …
How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO cares…
Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security architecture that reflects the business decisions and the information security policy decisions of the organization. In many cases, the security…
Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO as a Figurehead / CISO as a Fire Fighter / CISO as a Change Agent), we need…
Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security posture.…
Today’s Chief Information Security Officer (CISO) leads an increasingly precarious life.Since the emergence of the job title in the late 1990s, the CISO job has become more complex - and demanding - by the day. Whereas once this was a…
A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and antisocial). But he is one – he just “hacks” humans. Street is a…
Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan of attack. Like any good ol’ traditional heist, there are multiple stages to consider in a cyber-attack. To help prevent…