SECURITY

Subscribe
 

Do We Need a CDC for Cybersecurity?

A centralized cybersecurity agency could leverage the mission and approach of the U.S. Centers for Disease Control and Prevention to proactively respond to cyber threats in real-time.

Read More »

The Enterprise Is a Target

A new Kaspersky Lab survey finds that the enterprise is a favorite target of cybercriminals, with the average cost of a security breach now totaling $720,000 for a large company.

Read More »

The Sorry State of Cybersecurity

Globally, nearly 120,000 security incidents occur each day. However, information security budgets have shrunk for the fifth straight year—and most enterprises lack a cross-organizational team to deal with security issues.

Read More »

Nine Things You Need to Know About Insider Threats

The majority of enterprises can neither detect nor deter insider threats, according to a new survey. As a result, they are vulnerable to fraud, data breaches, and intellectual property theft. Sixty-one percent of respondents say they do not have the ability to deter an insider threat, 58 percent admit that they cannot detect an insider threat, and 75 percent say they cannot detail the human... Read More »

How to Prevent Insider Threats

Insider threats aren't going away anytime soon. Unfortunately, most businesses say they lack the ability to detect or deter them, nor are they adequately prepared for how to respond.

Read More »

Mapping to the NIST Cybersecurity Framework

Organizations can use the NIST Cybersecurity Framework, together with other information risk management tools, to build a robust cyber-resilient approach.

Read More »

11 Ways IoT Affects Security (And What You Can Do)

As the Internet of Things (IoT) grows, a variety of seemingly innocent consumer devices are connecting to companies' networks. They have the potential to negatively affect corporations, including compromising enterprise security. When employees bring their devices to the workplace, they connect them to company Wi-Fi and networks, giving hackers and intruders a new way to get in. Even worse,... Read More »

11 Challenges for Today's CIO

The 21st Century will be remembered as a highly transitional time for CIOs—for better and worse. On the positive side, there are more opportunities than ever to ascend to a senior leadership role. But there's also much at stake as CIOs have to advance the capabilities of tech within an environment of relentless, disruptive change—all while... Read More »

The Problem With Online Financial Fraud Prevention

Ross Hogan, global head of the Fraud Prevention Division for Kaspersky Lab, discusses the results of a new survey on how businesses are addressing online financial fraud.

Read More »

10 Tips for Managing Open Source Vulnerabilities

As software development becomes more collaborative, technology organizations are increasingly incorporating open source content into their software development environments. Linux is prevalent in data centers and Apache is in web services. And OSS is more prevalent in the Internet of Things than ever. Developers have used OSS for years and visit repositories like Read More »

Read More From Our Security Archive »
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date