A new study from Telos Corporation and conducted by Vanson Bourne, "Critical IT Assets Need Protection Beyond Standard Network Security," revealed that 99% of security professionals believe an attack on their critical IT assets would have both organizational and societal repercussions.
A network-centric, autonomous response hardens cybersecurity defense in the distributed enterprise by reducing the attack surface and automatically eliminating potential threats before they can reach devices and information on a protected network.
Within a diversified cybersecurity strategy, digital forensic analysis can ensure that organizations have the means to react in a timely manner and, more importantly, recover from a cyberattack.
In the Leadership Keynote speech at the Security Industry Association (SIA) Securing New Ground conference, Intel Vice President and General Manager for Client Security Strategy and Initiatives Tom Garrison outlined how and why supply chain security needs to be seen as both a physical and cybersecurity priority.
The second Voice of SecOps report from Deep Instinct revealed that the average time elapsed before a company responded to a cyberattack was 20.9 hours globally. The report surveyed 1,500 cybersecurity professionals about their top cyber concerns.
Cory Simpson, former Senior Director at the U.S. Cyberspace Solarium Commission and international expert on national security and emerging technology, has joined Resolute Strategic Services as an Executive Vice President.
Chris Jacquet, VP and Chief Information Security Officer (CISO) at Hitachi Vantara, explains how best to approach cybersecurity in the boardroom. Being prepared, honest and concise can help a CISO secure much-needed funding for their department.