High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus
Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...
"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.
See how global organizations rate their cyber threat detection capabilities and how your organization compares. Then, discover how they plan to evolve their security technology and strategy in the future.
A top Samsung official issued an unusual video apology over Galaxy Note7 battery-related defects linked to fires and assured owners that replacement Note7 units are safe.
"With battery cell defects in some of our Note7 phones,...
If your organization relies on traditional SIEM for threat detection, discover what Forrester research revealed about the capabilities of traditional SIEM, and why it's critical to augment with security analytics for rapid cyber