The traditional strategy of defense in depth security is a fallacy, says Mark Anderson, President, Palo Alto Networks.
advanced Persistent Threats
Vulnerability assessment and compliance akin to peanut butter and jelly in security, says Richard Bussiere of Tenable.
Featuring serious data breaches, major attacks and an ever-flowing stream of new vulnerability reports throughout 2015
The Radicati Market Quadrant for Advanced Persistent Threat (APT) protection identifies vendors by the development of their strategy and technology in regard to the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks.
Our holistic arsenal fights modern threats across organisations, says Nilesh Jain, India Country Manager at Trend Micro.
“Last year, we saw the board of directors being held responsible for cyber security oversight regularly,” says Julie Cullivan, EVP Business Operations and CIO of Fireeye.
You'll find five lessons in F-secure's "State of Cyber Security 2017" report that can shape and strengthen your approach to your business's security.
Fileless malware seems to be rearing its head. So how do you protect your organization against attacks that have no files to scan?
Discover the growth of IoT devices as attack tools, who is on the hunt for these devices, how they’re using them, and what attack trends are emerging.
Putting together a game plan to mitigate DDoS attacks before they happen is an essential step in bolstering your security posture, safeguarding your network, and protecting your business.
Fortinet issues top 5 cybersecurity predictions for FSI as attacks grow in number and complexity.
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago, through VPNs, proxies, and remote desktops. Explore five key changes in the enterprise landscape with regards to new access methodology.
Learn the difference between a well-implemented web application firewall and what most companies do, and the implications for your web application defense.
Explore how technology executives at leading financial services institutions meet performance and security challenges and capture new opportunities in cloud computing and mobile delivery.
More and more organizations rely on the cloud for Internet security. Choosing a cloud security solution, that works successfully with your existing security infrastructure, requires understanding on what’s being offered.
Targeted attacks are a CISO's biggest nightmare in today's complex multi-vendor IT infrastructure, says Mahendra Negi, Group CFO at Trend Micro.
Learn how cybercriminals can turn unsecured home routers into bots and how you can defend your homes and businesses against attacks.
The industry is shifting from focusing on cybersecurity as a technology problem, to cybersecurity as a business problem. Organizations must change their strategy and plan for chaos, instead of anticipating its arrival.