Forcepoint�� Stonesoft® NGFW earned a "Recommended" rating in the NSS Labs Next Generation Intrusion Prevention System (NGIPS) Comparative Report for overall security effectiveness, performance and TCO. Stonesoft outperformed IPS-only products while also providing next-gen/cloud-based firewalling, VPN connectivity,...
According to a recent report, barely one-third of global organizations feel prepared to handle a modern cyberattack such as malvertising or ransomware. Justin Dolly of Malwarebytes explains how security leaders can step up their game in 2017.
Dolly, who is both CIO and CISO at Malwarebytes, says he is not surprised...
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
Synchronoss' Tracy Hulver on New Identity Strategies for Connected Healthcare Threats
Attackers have healthcare entities in their crosshairs, and their favorite targets are easily compromised credentials. Tracy Hulver of Synchronoss Technologies offers new ideas for how security leaders can reduce risk and protect...
Cyberattacks grab headlines. The severity and frequency of attacks hitting both small and mammoth organizations alike continue to alarm the public...but cyber security professionals are the ones who really lose sleep at night. Before waiting for an attack to occur and scrambling to put a response program into action,...
Traditional antivirus (AV) just doesn't cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next...
Building a threat intelligence team from the ground up can be riddled with political inertia. This whitepaper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats.
Discover the six core competencies that comprise a...
From top to bottom, today's CISO needs a wide-ranging set of skills to be successful in defending their organization against hackers in the current threat landscape. Whether you're thinking of replacing your current CISO, considering bringing one on board, or are interviewing for the role, you must have a thorough...
If ransomware has not already had a significant impact on your organization, it is most likely because you have simply been lucky...so far. Almost half of entities in the U.S. have been hit this past year alone and have lost not only money, but also reputation, IT hours and in some cases, total business functionality....
Do your competitors and peers have a better cybersecurity game plan than you? If simply answering that question seems exhausting, this eBook is here to help.
Today's chief information officer knows they can't outsource risk. Yet every year, cyber risk demands more and more time from the already-busy CIO.
This...
By nature of its name, the so-called "dark web" has acquired a unique reputation. Danny Rogers of Terbium Labs discusses some of the key myths and realities about the dark web, as well as how organizations should monitor it. Why is this so important?
The dark web has become a well-traveled marketplace for data...
Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known as CyberSeek; the other is updated guidance known as the NICE Cybersecurity Workforce Framework. In this audio report, NICE Director Rodney Petersen explains the connection between the two.
Despite high-profile leaks and the attention given to the insider threat, many organizations still fail to even see that they have an insider threat problem. Ajit Sancheti, CEO of Preempt, discusses what's needed to improve insider threat detection.
It all starts with trust, Sancheti says. And sometimes, frankly, we...
What critical factors make the healthcare sector vulnerable to cyberattacks? In this audio interview, CISO Dave Summitt of the H. Lee Moffitt Cancer Center and Research Institute offers insights.
More than half of surveyed security leaders rate their organizations' current anti-malware protection above average or superior. And yet ...
54 percent say their organizations have experienced ransomware in the past year;
25 percent say they struggle with threat detection;
51 percent say their current anti-virus...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.