Security costs News
February 22, 2017
One expert warned there can be a disconnect between what security remediation means to CISOs and what researchers announce because of divergent objectives.
February 02, 2017
Aerohive shifts gears with Wi-Fi for small businesses that feature cloud-based management software, Cisco considers the true cost of a data breach and Arista beefs up visibility.
January 23, 2017
Statistics show organizations without ransomware protection are taking a huge risk. Analysts explain why it's important to be proactive in the fight against this epidemic.
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
Security costs Get Started
Bring yourself up to speed with our introductory content
In this Essential Guide, learn how to deal with increasing cyberthreats and discover best practices for developing a successful IT security strategy. Continue Reading
Expert Ed Tittel explores key criteria for evaluating threat intelligence providers to determine the best service for an enterprise's needs. Continue Reading
Learn how Chinese multinational company Wanxiang is using blockchain technology not only as a manufacturer, but also in a smart city initiative. Continue Reading
Evaluate Security costs Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? Continue Reading
Outsourced security services are always an option for enterprises. Expert Mike O. Villegas outlines the pros and cons of using MSSPs instead of in-house security. Continue Reading
Skill shortages and budget constraints have lead some companies to adopt a hybrid approach to managed security. Is it time for CISOs to start looking for 'expertise as a service'? Continue Reading
Manage Security costs
Learn to apply best practices and optimize your operations.
As the need for enterprise collaboration grows, so does the need for security. Organizations need to understand when confidential content is at risk and how to protect it. Continue Reading
Global threat intelligence is a valuable complement to a company's security program, but it can't replace security measures like training and internally collected data. Continue Reading
Small medical practices are often targeted by cybercriminals due to weak security practices, such as the lack of security maturity and nonstandardized regulatory requirements. Continue Reading
Problem Solve Security costs Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. Continue Reading
Machine learning in security is continuing to advance, and many companies now claim to have introduced artificial intelligence techniques into their platforms. With the high volume of data that most security teams have to prioritize, machine learning in security technology is increasingly being adopted as a way to reduce the noise that traditional security products produce.
Smaller companies, such as Keen Footwear, have turned to threat platforms that incorporate machine learning and AI techniques -- and soon automated defense -- to solve a variety of problems. "I don't need to go hire someone dedicated to security," said Clark Flannery, director of IT at Keen's headquarters in Portland, Ore. "It just feels like a whole team back there -- who are way more qualified than [staff] I would be able to pay."
With security professionals in short supply, companies like Keen are relying on these technologies to make it easier to spot and respond to attacks. While machine learning and artificial intelligence are often used interchangeably, the concepts are different. In this issue of Information Security magazine, we discuss the nuances and dive into the current state of the technology. Machine learning in security offers information security analysts more depth of knowledge, helping to detect patterns and related analysis they may not otherwise have known about.Continue Reading
A security portfolio shouldn't be used as an alternative to a reporting structure, but it can still be beneficial to enterprises. Expert Mike O. Villegas explains how. Continue Reading