Get the Report: CISO Recommendations for Endpoint Security by Security Current

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. BYOD. The post Get the Report: CISO Recommendations for Endpoint Security by Security Current appeared first on Bromium.
Read more

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success The post Cybersecurity vs Productivity: The CISO’s Dilemma appeared first on Bromium.
Read more

How to develop a Statement of Applicability in ISO 27001:2013

The Statement of Applicability (SoA) is one of the key documents that you will need to produce for your ISO 27001 information security management system (ISMS). What is the Statement of Applicability? The SoA is a crucial, mandatory report for ISO 27001 certification. It’s also an essential report for the management and control of your ISMS. ISO/IEC 27001:2013 states that, as part of the risk assessment process, organisations must produce an SoA that contains: The necessary controls; Justifications for their inclusion; Whether the necessary controls have been implemented or not; and Justifications for excluding any of the Annex A controls.
Read more

Labs report: summer ushers in unprecedented season of breaches

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams. Categories: Malwarebytes news Tags: 3rd quarterandroid malwareastrumbreachcerbercybercrimecybercrime tactics and techniquesemotetEquifaxexploit kitfrancophonefruitflyglobeimposterLockymac malwaremalicious spammalspamMalwarebytesmalwarebytes labsnational health serviceNHSoceanlotusq3 2017reportRIGsmartscreensonictech support scamstrickbottrojan.clicker.hyjwhole foods (Read more...) The post Labs report: summer ushers in unprecedented season of breaches appeared first on Malwarebytes Labs.
Read more

How a Mind Map Can Help Organizations Better Understand Threat Intelligence

Over the past few years, cyber threat intelligence has matured to cover many different aspects of business. What threat intelligence is and how people view and define it can vary quite a bit depending on the vendor providing the intelligence, the business unit consuming that intelligence, the deliverables expected of the intelligence, and the ultimate… Read More
Read more

3 reports needed for an ISO 27001 audit

An ISO 27001 audit can be intimidating, especially if it is the first time that your information security management system (ISMS) has been audited. Producing accurate, concise and updated reports is an important part of your audit. Some reports are mandatory, whereas others will help you to impress your auditor. Statement of Applicability (SoA) The SoA is a crucial, mandatory report for your ISO 27001 audit. It’s also essential for the management and control of an ISMS. The SoA identifies the controls that are relevant to your organisation and explains why those controls have been selected to treat the identified
Read more

Dark Web Markets, Equifax Breach Raise Authentication Concerns

The recent Equifax breach once again has the whole nation talking about cybercrime — and the widespread fraud and identity theft likely to follow in the wake of 143 million compromised consumers. Identity theft is a major concern for individuals, but as SurfWatch Labs chief security strategist Adam Meyer noted, malicious actors spring boarding off… Read More
Read more

Forrester Report Outlines True Cost of Data Breaches

Data breaches hurt. Just ask Equifax, the latest poster child in the ongoing litany of companies where breaches may have exposed customer data. It joins the ranks of Target and Home Depot in offering real-life examples of expensive and painful business-recovery plans. A recent Forrester Research report, “Calculate The Business Impact And Cost Of A..
Read more

Bimodal Approach to IT Meets Digital Business Challenges – Coordinating Services, Not Controlling Assets

Businesses embracing agility and scalability as part of digitalization onboarding will have to adhere to hybrid compute and storage models based on multiple infrastructure as a service (IaaS) and platform as a service (PaaS) providers, according to Gartner's Strategic Roadmap for Datacenter Infrastructure report that can be downloaded here. With 10 percent of organizations closing off their on-premise data centers by the end of 2018, 80 percent of enterprises will adhere to IaaS and PaaS by 2019.
Read more

Leaked Exploits Have Fueled Cybercrime So Far in 2017, Says New Report

Leaked exploits and increased cybercrime-as-a-service offerings — along with the expanding digital footprints of organizations — helped to fuel cybercrime in the first half of 2017, according to a mid-year threat intelligence report from SurfWatch Labs. The global outbreaks of WannaCry and NotPetya have dominated headlines so far this year. Although vastly different from the record-setting,… Read More
Read more
Page 1 of 212