Category Archives: INDUSTRY INSIGHTS

2017 breaks record for new vulnerabilities

More than 20,000 new vulnerabilities were cataloged in 2017 according to breach analysis specialist Risk Based Security.The figures from the company’s own VulnDB eclipsed the total covered by MITRE’s Common

The post 2017 breaks record for new vulnerabilities appeared first on The Cyber Security Place.

Businesses need to think differently data management in the digital age?

Increased use of digital technology is creating massive amounts of data from cloud, mobile, IoT and more, resulting in data deluge Companies across industries are racing to embrace digital transformation

The post Businesses need to think differently data management in the digital age? appeared first on The Cyber Security Place.

SecurityWeek RSS Feed: 10 Ways to Lose That Security Sale

There are few things in life more dissimilar than security practitioners and the salespeople that sell to them.  The interaction between these two groups in a professional setting often creates some pretty interesting situations.  Although it can be awkward at times, I have learned a lot from watching these interactions closely.

read more



SecurityWeek RSS Feed

Financial services firms most adept at making balanced security investments

Cyber attacks cost financial services firms more to address and contain than in any other industry, and the rate of breaches in the industry has tripled over the past five

The post Financial services firms most adept at making balanced security investments appeared first on The Cyber Security Place.

Don’t be a “CIS-No,” Regain Control of your Data

Just like all things security, yet another new concept has taken the market by storm, being repeated over and over again. The perimeter is dead. We are living in a world without walls where criminals, employees and devices exist on the inside and outside. Firewalls may or may not stop external bad actors from breaking in, yet in many cases, those bad actors are already inside using stolen credentials to masquerade as legitimate employees.

read more

Enterprises spend more than $16 million on hidden costs of detection

Most organizations employ some kind of detection-based security to protect their systems. But a new report by cyber security company Bromium reveals that this approach has major hidden costs.Upfront licensing

The post Enterprises spend more than $16 million on hidden costs of detection appeared first on The Cyber Security Place.

Hiscox: Global Firms Still Struggling to Get Cyber-Ready

Nearly three-quarters of global firms fell short of adequate cyber-readiness, despite the majority ranking online threats as the number one risk to their business, according to Hiscox.The insurer’s Cyber Readiness

The post Hiscox: Global Firms Still Struggling to Get Cyber-Ready appeared first on The Cyber Security Place.

Highlights From the World Economic Forum’s ‘Global Risks Report 2018′

“In a world of complex and interconnected systems, feedback loops, threshold effects and cascading disruptions can lead to sudden and dramatic breakdowns.” — The World Economic Forum’s “Global Risks Report

The post Highlights From the World Economic Forum’s ‘Global Risks Report 2018′ appeared first on The Cyber Security Place.

Government pushes cyber security boost for critical industries

Offenders may be punished with fines is they don’t ensure their cybersecurity is up to scratch.Britain’s most important industries need to step up their cybersecurity game or risk large fines,

The post Government pushes cyber security boost for critical industries appeared first on The Cyber Security Place.

Digital Forensics – The Essential Chain of Custody

By Ron McFarland, Ph.D., CEH, CISSP Figure 1: Chain of Custody, (Kent, 2006) If you are into Cyber Security, you will be, at one point in your career, involved in

The post Digital Forensics – The Essential Chain of Custody appeared first on The Cyber Security Place.

The Superhuman Security Analyst: Are We Expecting Too Much?

If you have a minute, look at the average job description for an enterprise security analyst on any career website. The responsibilities are borderline superhuman, and the qualifications lengthy and

The post The Superhuman Security Analyst: Are We Expecting Too Much? appeared first on The Cyber Security Place.

Cybersecurity: What Does the Board Want and Need?

There should be little doubt about the importance of cybersecurity these days, given the amount of attention the topic has garnered. The attack surface is growing as a result of

The post Cybersecurity: What Does the Board Want and Need? appeared first on The Cyber Security Place.

SecurityWeek RSS Feed: Risks to ICS Environments From Spectre and Meltdown Attacks

The recently disclosed Spectre and Meltdown vulnerabilities, which affect hardware running in the majority of the world’s computing devices have made headlines recently. The list of at risk equipment includes workstations, servers, phones, tablets, as well as Microsoft Windows, Linux, Android, Google ChromeOS, Apple macOS on most Intel chips manufactured after 2010.

read more



SecurityWeek RSS Feed

SecurityWeek RSS Feed: Cybersecurity’s Marketing Dilemma

Cybersecurity has gone through many changes over the past decade. From being a niche sector, rarely taken seriously or understood, to underpinning national security, economic growth and the availability of financial infrastructures. In the process it has become a large, high growth and consequently overfunded market. 

read more



SecurityWeek RSS Feed

How to engage with the C-Suite on cyber risk management, part 4

Creating metrics to indicate risk.In part 3 of our metrics series, we discussed we how KRIs help identify risks while KPIs help us measure them. In this, our final article

The post How to engage with the C-Suite on cyber risk management, part 4 appeared first on The Cyber Security Place.

Strong Incident Response Starts with Careful Preparation

Through working every day with organizations’ incident response (IR) teams, I am confronted with the entire spectrum of operational maturity. However, even in the companies with robust IR functions, the rapidly evolving threat landscape, constantly changing best practices, and surplus of available tools make it easy to overlook important steps during planning. As a result, by the time an incident occurs, it’s too late to improve their foundational procedures. 

read more

Increasing Security Preparedness and Awareness Among Board Members

Corporate boards generally understand cyberthreats and preparedness at a high level and constantly look for indications of how well-prepared their information security managers are. As cybersecurity gains public attention, upper

The post Increasing Security Preparedness and Awareness Among Board Members appeared first on The Cyber Security Place.

3 ways to keep businesses safe from cybercrime in 2018

In the fight against cybercrime, companies can expect things to keep getting worse before they get any better With 2.7 billion more IoT devices brought online in 2017, businesses saw

The post 3 ways to keep businesses safe from cybercrime in 2018 appeared first on The Cyber Security Place.

Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business

If both companies and sovereign countries deploy cyber-attacks on their enemies, perhaps the goal is to disable the tech that rival entities rely on. Other times the mission may involve

The post Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business appeared first on The Cyber Security Place.

The role of trust in security: Building relationships with management and employees

Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest shortcomings are often

The post The role of trust in security: Building relationships with management and employees appeared first on The Cyber Security Place.

CISOs are feeling less confident than ever about cyber risk and data security

Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in late 2017.As today’s climate

The post CISOs are feeling less confident than ever about cyber risk and data security appeared first on The Cyber Security Place.