Deployed at the network layer, segmentation was first developed to improve network performance. But as cybersecurity experts have realized that a "perimeter only" approach to security is not working, it has become increasingly clear the micro-segmentation is foundational to data center and cloud security. ...
The explosive growth of IP networking has let a genie out of the bottle. The more an organization or nation is connected to the internet, the more vulnerable it becomes. The challenge is finding the right balance between "can" and "should" - the fact that we can connect every person, server, app, and cloud vs. the...
The proliferation of apps, wearables, sensors and other connected devices that provide access to real time health and wellness data have the potential to revolutionize the provision of healthcare. In addition, the healthcare industry is increasingly tapping into the power of deep learning to analyze health data sets...
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
In the great Internet of Things gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences as the IoT is vulnerable to hacks that can give malicious actors control over connected devices. Recent DDoS attacks and...
Businesses spend billions each year on identity and access management, but almost all of this money is spent on protecting the digital identities of humans - usernames and passwords.
On the other hand, businesses spend almost nothing on protecting machine identities, even though our entire digital economy hinges...
We all know that May 25 was the enforcement deadline for Europe's General Data Protection Regulation. But what impact will General Data Protection Regulation have on cybersecurity programs?
GDPR, or the "Y2K" of our era, is part of a larger conversation that's been catalyzed by a lot of the recent news around...
We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.
At a time when so many new devices are connected to enterprise networks, security leaders struggle just to inventory the devices - never mind secure them. Nathan Burke, CMO of Axonius, a new device management vendor, discusses the niche Axonius fills.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Download this thought-leadership whitepaper...
Cloud computing is proliferating and taking over the world of IT as we know it. Cloud computing also grows more complex and multi-faceted daily. Getting onto the cloud is easy. Getting it right is trickier. You can probably see why a carefully thought-out and detailed approach to cloud computing - a strategy, in other...
Cybercriminals are organized, well funded, and highly motivated. They are deploying advanced malware, leveraging cloud-based computing resources, and developing cutting edge tools to attack your organization's data.security defenses.
The proliferation of online devices accessing personal and financial information,...
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
CynergisTek's 2018 report aggregated ratings from security assessments performed at hundreds of healthcare organizations in 2017 to reveal an average 45% conformance with NIST Cybersecurity Framework (NIST CSF). The report found that of the NIST CSF five Core Elements, organizations had the lowest ratings in detecting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.