Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most. We'll discuss emerging vendor management trends and breakdown how risk exchanges are key to more efficient business...
If you analyze any of the recently published cyber attacks, two patterns emerge:
80-90% of the attacks exploit an unpatched vulnerability or an unhardened, widely open system
70% of the attacks begin at the endpoints
While "cool" new products create a lot of buzz, cyber hygiene is often ignored. But, it must be...
Security requirements need to be understood holistically in the context of your entire IT environment. Products and tools need to effectively address requirements without contributing to the chaos. Budgets and human resources are limited and need to be applied for maximum benefit.
But with hundreds of product...
Distributed denial-of-service (DDoS) attacks are increasingly complex and they frequently employ multiple attack types and strategies such as multivector and diversionary attacks against a broad set of targets. Industry reports continue to illustrate that no one organization is safe.
Even though DDoS prevention...
Leading this week's industry news roundup, IBM announces Identity Mixer, a cloud-based encryption technology designed to protect personal data online, while Proofpoint releases its Enterprise Protection Suite 8.0.
Leading this week's industry news roundup, BAE Systems launches a corporate security analysis service to assist companies with social risk monitoring, while Arbor Networks appoints its first chief technology and security officer.
Leading this week's industry news roundup, Trend Micro and Hewlett Packard collaborate to help fight advanced targeted threats and custom malware, while First Data and VeriFone partner to expedite EMV compliance.
Leading this week's industry news roundup, Intel introduces a solution that provides end-to-end encryption of consumer and financial data built into POS systems, while Arbor Networks launches Peakflow, a DDoS mitigation solution.
Leading this week's industry news roundup, Sophos acquires Mojave Networks to help strengthen its cloud-managed and appliance-based security solutions, while Corero introduces a DDoS analytics application.
Leading this week's industry news roundup, IBM opens a new cloud resiliency center to provide business continuity capabilities, and Gemalto launches a solution to enable secure eBanking applications on PCs.