Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by 29 percent worldwide, as thousands of global organizations and insurers can attest to. This trend has been a driving factor for the growth of cyber insurance, which has come a long way in the last twenty plus years. However, even then, cyber experts were raising…

Read More

SMS PVA Part 2: Underground Service for Cybercriminals

SMS PVA Part 2: Underground Service for Cybercriminals

In this sample, we can see an Indonesian mobile number with an “ethnically” matching photograph in Whatsapp (presumed real account of the owner), but with a Russian name in Telegram (account presumed to have been registered using SMS PVA). These are just some illustrations of the common trend we saw on smspva.net. Either the accounts have different names across different services, or the country of the mobile phone does not match the language used in…

Read More

Q&A on the MITRE D3FEND Framework – Cisco Blogs

Q&A on the MITRE D3FEND Framework – Cisco Blogs

Everyone in the security community is familiar with the ATT&CK framework developed by MITRE. ATT&CK, which stands for Adversary, Tactics, Techniques, and Common Knowledge, is a comprehensive knowledge base of adversary behaviors used by threat actors across the threat lifecycle. While ATT&CK takes on the perspective of the adversary, there was no documented set of defensive countermeasures, until now.  In this blog post, I talk to Pete Kaloroumakis from MITRE, who has developed the D3FEND…

Read More

Why Everyone Needs a VPN

Why Everyone Needs a VPN

You may hear corporate cybersecurity experts hail the benefits of a VPN, or a virtual private network, to keep company information safe from ransomware attacks and cybercriminals seeking to steal valuable business secrets. It’s unlikely that everyday people, such as yourself, will be targeted by a ransomware scheme, so you may be puzzled about how a VPN can help someone like you be safer online. Luckily, with a VPN being very easy to install and…

Read More

Two principles for delivering powerful presentations

Two principles for delivering powerful presentations

Over the years, Steve Rubinow noticed how many of the hard-won lessons he learned as an influential global CIO at financial giants such as the New York Stock Exchange or Thomson Reuters were just as applicable at smaller firms and startups in other industries, too. So, this CIO Hall of Famer started writing down what he calls his Guiding Principles—a pithy collection of thoughts, quotes, and discovered wisdom. “I found I was repeating them to…

Read More

Understanding Identity Detection and Response

Understanding Identity Detection and Response

Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might be ongoing on a corporate network. By Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Introduction Cyber defenders categorize security protections as either preventive or reactive. Preventive security, such as strong authentication, focuses on stopping something bad from happening. Reactive security, such as…

Read More

How Data Fabrics Build Trust for Data and Analytics Success

How Data Fabrics Build Trust for Data and Analytics Success

By Chad Smykay Companies have access to more data than ever before – but it doesn’t mean everyone in an organization trusts the reliability of that data and resulting analytics. A company may be filled with data engineers and analysts with tremendous individual virtuosity when it comes to dissecting and utilizing data, but that doesn’t necessarily create organization-wide trust of data. Companies need a way to manage their data that systematically and consistently ensures the…

Read More

Prevent Ransomware with New Capabilities from Anomali

Prevent Ransomware with New Capabilities from Anomali

In these uncertain times, ransomware attacks are only increasing, and Anomali is highly focused on helping CIOs and CISOs of enterprise businesses across the Globe along with our federal government and other government agencies. This is an infinite Journey against the bad guys, and we must all work together with all hands-on deck. Today, organizations employ defense in depth strategies to stop attacks. And while siloed security control points are effective at stopping most attacks…

Read More

Can Security Really Be Open Source?

Can Security Really Be Open Source?

By Sunil James Cloud computing software and services universally use open-source software (OSS) such as Linux, Apache, MySQL, PHP, and Python. But while Linux has long included security capabilities, as did SNORT (a computer-based network intrusion detection system software), other OSS have seemingly had less impact on security—until now. Today, we see significant changes happening. For example, TechGenix reports, “one look at the top Cloud Native Computing Foundation (CNCF) projects shows a lack of security-only…

Read More

How AI and Analytics Help Organizations Deliver a Better Customer Experience

How AI and Analytics Help Organizations Deliver a Better Customer Experience

By Jimmy Bates With more options than ever before, customers will not stand for being treated in a generic, impersonal manner by a business. Today’s customers want their problems solved quickly and efficiently using the information they have provided. If a customer has entered an order and a business acts like they don’t know about it, that’s a problem. Customers also want to know the companies they entrust with their data have mature security and…

Read More
1 3,204 3,205 3,206 3,207 3,208 4,067