While it’s no surprise that organizations are being compromised, a new study released by Ponemon Institute found that the rate at which organizations are compromised is quite alarming. The study, 2018 State of
The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition
The post Endpoint Security: It’s Way More Complicated than You Think appeared first on The Cyber Security Place.
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of Industrial Security
The post Safe IT/OT integration with unidirectional security gateways appeared first on The Cyber Security Place.
Splunk ups security protection with range of new smarter services.Splunk has revealed a major upgrade to its security protection as it looks to provide peace of mind for customers all
The post Splunk boosts business security offerings through the power of AI appeared first on The Cyber Security Place.
Machine learning can aid security teams by enhancing their ability to detect and remove potential threats.No matter where you look in the security world today, you’ll see the terms machine
The post Employing machine learning in a security environment appeared first on The Cyber Security Place.
A security information and event management system, or SIEM (pronounced “SIM”), is a security system that ingests event data from a wide variety of sources such as security software and
The post SIEM Guide: A Comprehensive View of Security Information and Event Management Tools appeared first on The Cyber Security Place.
Over the coming years, the very foundations of today’s digital world will shake – violently. Innovative and determined attackers, along with seismic changes to the way organizations conduct their operations,
The post No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats appeared first on The Cyber Security Place.
As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, and an acute shortage of skilled
The post Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence appeared first on The Cyber Security Place.
Traditional security controls, now too manual and slow to keep pace with digital business processes, customer experiences and workflows are being relegated to the compliance toolbox. They will satisfy regulators,
To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than
The post A guide to cyber attacks: Denial of Service – Part 3 appeared first on The Cyber Security Place.
Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk
The post Personal mobile devices are the biggest threat to your network appeared first on The Cyber Security Place.