The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?
Attribution is often regarded as a primary goal within a cybersecurity investigation, but as John McClurg, CISO at Blackberry, explores here, conclusive attribution should at times exist as a secondary consideration - one abandoned if the ROI doesn't justify its expense.
The IBM X-Force Threat Intelligence Index 2020 highlights how cybercriminals' techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws.
It’s one thing to ensure that all of the possible threat entry points are covered by an organization’s security infrastructure, it’s another to ensure proactive protection.
With the demand for highly skilled cybersecurity experts growing every day, the University of Guelph will launch a new graduate degree in cybersecurity and threat intelligence to train the next generation on how to stop cyberattacks before they happen.
After the 2017 Brazilian Grand Prix, a Mercedes F1 Grand Prix team minibus full of team members leaving the F1 Circuit in Sao Paulo was robbed at gunpoint. Valuables were stolen from the minibus during the attack. What could security personnel have done differently to mitigate the risk of such an attack?