Category Archives: Hardware/Network

Endpoint Attacks Increase as Patching Slows

While it’s no surprise that organizations are being compromised, a new study released by Ponemon Institute found that the rate at which organizations are compromised is quite alarming. The study, 2018 State of

The post Endpoint Attacks Increase as Patching Slows appeared first on The Cyber Security Place.

Reducing Analyst Fatigue with Machine Learning

Security analysts must ensure that incidents are managed effectively with the least amount of impact on business operations or users. Without the right tools, security event and alert management can

The post Reducing Analyst Fatigue with Machine Learning appeared first on The Cyber Security Place.

Endpoint Security: It’s Way More Complicated than You Think

The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition

The post Endpoint Security: It’s Way More Complicated than You Think appeared first on The Cyber Security Place.

Safe IT/OT integration with unidirectional security gateways

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of Industrial Security

The post Safe IT/OT integration with unidirectional security gateways appeared first on The Cyber Security Place.

Splunk boosts business security offerings through the power of AI

Splunk ups security protection with range of new smarter services.Splunk has revealed a major upgrade to its security protection as it looks to provide peace of mind for customers all

The post Splunk boosts business security offerings through the power of AI appeared first on The Cyber Security Place.

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

A security information and event management system, or SIEM (pronounced “SIM”), is a security system that ingests event data from a wide variety of sources such as security software and

The post SIEM Guide: A Comprehensive View of Security Information and Event Management Tools appeared first on The Cyber Security Place.

IoT malware sees major rise

Not even your washing machine is safe from new threats, Kaspersky warns. The number of malware targeting Internet of Things (IoT) devices is ‘snowballing’, Kaspersky Lab’s newest report claims.The company’s

The post IoT malware sees major rise appeared first on The Cyber Security Place.

No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

Over the coming years, the very foundations of today’s digital world will shake – violently. Innovative and determined attackers, along with seismic changes to the way organizations conduct their operations,

The post No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats appeared first on The Cyber Security Place.

Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, and an acute shortage of skilled

The post Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence appeared first on The Cyber Security Place.

Hardware Security Revisited

As Spectre and Meltdown demonstrated earlier this year, hardware is no less vulnerable to attack than any other system because hardware is an often overlooked piece of the security puzzle.  Security and

The post Hardware Security Revisited appeared first on The Cyber Security Place.

How Digital Transformation can Save Cybersecurity

Traditional security controls, now too manual and slow to keep pace with digital business processes, customer experiences and workflows are being relegated to the compliance toolbox.  They will satisfy regulators,

The post How Digital Transformation can Save Cybersecurity appeared first on The Cyber Security Place.

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

The post A guide to cyber attacks: Denial of Service – Part 3 appeared first on The Cyber Security Place.

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

The post Personal mobile devices are the biggest threat to your network appeared first on The Cyber Security Place.