The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
What’s the ideal password policy?
Should you be emphasizing password length or complexity?
This guide will help determine a policy that’s strong enough to protect your business and thwart potential hackers, but not so complicated that employees will ignore it.
Download this guide and learn:
Why numbers and...
Virtually every organization and industry today is at risk of being targeted by a ransomware attack, and those attacks are more devastating than ever. 2021 has already proven this new reality with major events affecting Colonial Pipeline, DC Police, Kia Motors, Acer and Kaseya - just to name a few.
In 2020, reports indicated that cyberattacks on the healthcare industry more than doubled from 2019, with
ransomware accounting for 28 percent of all attacks. Unlike previous attacks focused
primarily on providers, the COVID-19 pandemic
exposed vulnerabilities in the entire healthcare sector.
If you're not "on board" with the Functional Safety Standard EN 50128:2011 - “Railway
applications - Communication, signaling and processing systems - Software for
railway control and protection systems" - you'll need to run to catch up.
Currently the systems included under EN 50128 include
The SolarWinds attack has cybersecurity leaders everywhere taking a hard look at third-party risk. But it’s one thing to have a fresh strategy and quite another to actually start holding vendors accountable for their own security.
Download this expert briefing to learn:
The areas that risk managers commonly...
With the explosion of remote business, we are now digitizing many of our documents and processes. Entrust’s Jay Schiavo explains what new mindset this shift requires, what’s needed to ensure document authenticity and integrity.
Large Service Provider Achieves
Overall Improved Risk Profile with
Closed-Loop Change Management
and Full Network Context
Trusted by leading global brands for more than 40 years,
this service provider is one of the largest in Europe.
With more than 10,000 employees and nearly
20 operations centers throughout...
Third parties are one of the top attack vectors and according to a recent
Ponemon report, in the last three years, the financial services industry
experienced the second most third-party breaches despite spending the
most time on assessments (over 17,000 hours/year).
In response to the growing threats, regulators...
Attacks through third parties are even more prevalent, which jeopardizes not only the security of sensitive data, but it also provides attack vectors for hackers to take down critical systems via IoT, unauthorized access, etc. Supply chain systems are an integral part of the oil and gas industry’s survival and bad...
The financial services industry is a leading target for cyber criminals because there’s not just one way to profit from an attack. Whether it’s the direct theft of funds and customer data, extortion, or fraud, financial institutions have a metaphorical bullseye on their backs when it comes to...
The pandemic only amped up the need for better bandwidth, visibility and centralized management, and all within a budget that will make it possible. Prior to COVID-19, Kumar Ramachandran of Palo Alto Networks declared 2020 the “year of the early majority” for SD-WAN adoption.
Ramachandran, former CEO of...
The distributed workforce, combined with the need to modernize and improve operational efficiency, has reframed digital transformation priorities and introduced new areas of risk to today's enterprise. In light of ongoing macroeconomic demands, the CISO is facing increasing pressure to deliver value.
Everything has changed. Organizations have quickly pivoted towards the "new norm", adopting new practices and new technology solutions to support the business. Security multi-year strategies have not caught up. This new norm introduced new security threats to an already crowded threat landscape at a time when...
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Although enabling a remote workforce is typically a common practice, some particularly urgent and...