Security costs News
September 25, 2017
Speaking at the (ISC)2 Security Congress, FBI Deputy Assistant Director Don Freese spoke about need for security pros to replace fear and emotion with proper cyber-risk management.
September 22, 2017
Bloggers look into Veriflow's new intent-based network capabilities, BGP convergence without timer changes and the success of security spending.
August 17, 2017
Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.
August 16, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors explore the FBI's case against security researcher Marcus Hutchins, better known as MalwareTech.
Security costs Get Started
Bring yourself up to speed with our introductory content
With digital transformations underway in many industries, CIOs aren't the only ones who need to have the next big thing on their radar. What security innovations should you follow to ready your organization's information security programs?
The internet of things is both a security threat and potentially a security boon. Big data, machine learning and a growing number of systems with pseudo artificial intelligence may help ease the workloads of security analysts. Bitcoin's distributed database technology known as blockchain can add security to a variety of systems, but scalability remains an early concern. Quantum computing? That one may be too far out -- five years at least -- to be considered a near-term technology disruptor to enterprise information security programs.
Whether your organization is focused on manufacturing and infrastructure -- such as industrial control systems -- or consumer and information technology -- such as the internet of things -- everything is rapidly becoming connected and potentially accessible from the internet. Many information security programs are not on track for the internet of things, complex clouds and other technology disruptors. We dust off the crystal ball in this issue of Information Security magazine and ask infosec experts and venture capitalists to look into the future.Continue Reading
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
The emergence of threat hunting programs underscores the importance of the human factor in fighting the most dangerous and costly security threats. Continue Reading
Evaluate Security costs Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt from chapter three of Cybercrime and Business, author Sanford L. Moskowitz discusses the effects cybercrime can have on small- and medium-sized businesses. Continue Reading
From April through mid-May 2017, HIMSS North America commissioned a survey on the topic of healthcare cybersecurity. The HIMSS cybersecurity survey received feedback from 126 information security ... Continue Reading
A unified network security platform can offer organizations significant savings by helping them to reduce outages and the number of security components being managed. Continue Reading
Manage Security costs
Learn to apply best practices and optimize your operations.
Until WannaCry and NotPetya, estimates of ransomware cost and damages were likely overblown. But indications are that companies lost hundreds of millions from these attacks alone. Continue Reading
When Yahoo finally disclosed a massive 2014 data breach to up to five hundred million affected account holders in September 2016, some already had legal representation. Continue Reading
Don't fall victim to a hacked root account. Create and work within new AWS accounts, and then apply the least amount of privilege necessary to prevent a costly mistake. Continue Reading
Problem Solve Security costs Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Laura Didio of ITIC outlines the top 10 business and procedural must-do steps organizations should take to safeguard the IoT ecosystem and mitigate risk. Continue Reading
Because it's important to protect your backups against ransomware, a cloud backup system is a strong option. Critically, cloud backups are off the network. Continue Reading
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help. Continue Reading