As technical director of the Attack Investigations Team at Symantec, a division of Broadcom, Eric Chien has access to intelligence and telemetry on the latest attack trends. He shares insights on supply chain attacks and more - and discusses how defenders can raise their game in response.
In an interview with...
How can endpoint security tools help in combating attackers who enter organizations by such stealthy means as "living off the land" attacks? In this Tech Spotlight, Adam Licata of Symantec, a division of Broadcom, discusses the new endpoint security challenges for cybersecurity leaders.
In an interview with...
Manoj Sharma has been associated with Symantec for nearly 20 years. But during that time he did not see seismic changes like the ones that have altered the cybersecurity landscape over the past 15 months. He shares insights on how to secure the new extended enterprise.
In an interview with Information Security...
The world has changed over the past year, but cyberthreats never rest. According to the report, 86 percent of organizations experienced at least one successful cyberattack last year. The more you know about how your peers are handling the most serious threats, the more effectively you can secure your own...
Longtime Qualys leader Sumedh Thakar recently was named CEO of the company. Now he's laying the groundwork for a long-term vision that includes helping customers adjust to the new enterprise security landscape and embrace cybersecurity asset management.
In an interview with Information Security Media Group as part...
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Phishing, online fraud, cryptocurrency scams – they are coming at lightning speed, threatening enterprises and their brands. And just as fraudsters rely on automation to deliver these attacks, defenders can use automated tools to protect their brands. Jeff Baher of Bolster tells how.
“The volume of phishing and...
This survey is currently closed. Thank you.
We have broken down the confines of the traditional enterprise perimeter, and we have created the largest potential attack surface in history. Yet, what have we done to improve our visibility and reduce the critical lag time between incident detection and...
Zero Trust, Firmware in the Supply Chain, and the Demand for Device Integrity
What does the Executive Order on Cybersecurity mean for security teams tasked with protecting endpoints, servers, and network devices? Download this report from Eclypsium to learn new Zero Trust requirements, their implications for device...
As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic server environment requires smart access controls; but how do you adhere to your security policies without limiting automation?
Read the five key takeaways from a webinar featuring Dr. Chase...
This year, attackers are permeating the everyday lives of consumers, citizens, and lawmakers everywhere. The response to recent ransomware attacks on companies is serving as a reminder that cybersecurity, at its core, is a matter of building and maintaining trust.
Meanwhile, organizations and security professionals...
As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.
In this whitepaper, we cover Okta ThreatInsight, a baseline security feature of the Okta Identity Cloud which helps organizations secure their organization...
Five questions to evaluate and improve your device security posture in 2021
APTs and ransomware actors are increasingly leveraging firmware vulnerabilities to penetrate enterprise devices. To keep pace, you need to understand and address the risk to your organization.
This report from Eclypsium will help your team...
It would seem for the foreseeable future, if you want something done, it will increasingly have to be done remotely. This is the new operating environment in which we have had to live, adapt and deliver.
This whitepaper is not intended to be an exhaustive guide to mainframe services and client requirements in the new...
Mainframes are often considered one of the most secure data
environments, but organizations are mistaken to believe that mainframes
are inherently secure. In reality, secure means “securable.”
Download this Forrester research report, which includes data on:
Current perceptions of mainframe security
Readiness...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.