Securiosity: How is information being shared during the pandemic?
Despite the world being in the state it’s in, there is still an internet to defend. Whether its information about criminals spinning up COVID-related scams, a run-of-the-mill ransomware attack, or some...
View ArticleThreat intelligence increasingly depends on AI
Artificial intelligence is playing an increasingly critical role in preventing, detecting and remediating cyber-threats as the nature of attacks evolves, and adversaries operate in well-organized,...
View ArticleCloud and AI key to managing risk and compliance
The post Cloud and AI key to managing risk and compliance appeared first on CyberScoop.
View ArticleDefenders need to increasingly rely on agility in cyberspace
The majority of cyber adversaries have already embraced agility as critical to their cyberattack operations, moving quickly and efficiently to exploit global events, vulnerabilities, the expanding...
View ArticleHow zero trust helped insulate Splunk from supply chain attack
When the news broke that a pervasive supply chain attack had compromised a wide swath of government and commercial sector IT systems, one of the first companies many organizations called in to help...
View ArticleUnderstanding ransomware at the Pentagon
Just because the U.S. Marine Corps has never been struck with ransomware doesn’t mean cybersecurity personnel in the military aren’t working to fend off such attacks. That’s according to Renata...
View ArticleWell-funded, organized attacks require strategic counter-defense strategies
Enterprise CIOs and CISOs in government and the private sector are still assessing the full impact of the advanced supply chain attacks uncovered in recent months. “A high-profile supply chain attack...
View ArticlePractical strategies to establish a zero-trust security environment
IT and security experts have been advocating for enterprises to adopt zero-trust security disciplines for the better part of a decade. But will the pandemic, and the massive shift of employees now...
View ArticleCyber Everywhere: The growing threat of mis-, dis-, and malinformation
While not a new threat, mis-, dis-, and malinformation (MDM) today spreads faster, farther and more frequently than ever before. In the latest in a series of podcasts, called “Cyber Everywhere,”...
View ArticleThe case for transitioning to a single, multi-cloud IAM platform
One of the growing challenges CIOs and CISOs must grapple with as they expand their use of cloud services is how to rationalize their collection of identity, access and privilege control systems...
View Article
More Pages to Explore .....