AusCERT is one of the oldest CERT's in the world, and Phil Cole says the independent organization is now laser-focused on helping enterprises across sectors to fundamentally improve their strategies and solutions for incident response.
Determined attackers constantly find new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. Knowing who is behind the threats you face and what their motivations are can help you implement security measures to put them on the defensive.
Organizations and analysts need the ability to shift threat intelligence from a data feed into actionable results - this is the core of applied threat intelligence (ATI). Organizations need to move their thinking away from viewing data breaches as a onetime event and instead recognize that with every incident they are...
Enterprise Intelligence is an ongoing practice in which organizations analyze disparate data sources to identify the vulnerabilities and threats across the enterprise.
Download this infographic and learn:
How much more likely analytically driven organizations are to respond to security threats;
What percent of...
Who are the top security analytics (SA) providers, and what sets them apart? Forrester researched, analyzed and scored the 11 most significant SA vendors to help organizations evaluate their offerings.
Download this whitepaper and learn:
Who the top four leaders in the market are;
Why security and risk (S&R)...
For public sector agencies caught between the prohibitive cost of a formal security operations center (SOC) and the wholly inadequate protection from an informal SOC, there is a solution: building a SOC that automates as much of the work as possible.
Download this whitepaper and learn:
How automation can help a...
A public sector agency that makes use of security intelligence and analytics takes the burden off its OPSEC team. Powerful machine analytics can make associations among traces of evidence and identify security events much more quickly and efficiently than humans can. Automation enables you to respond to an incident in...
When a threat actor targets your environment, a process unfolds from initial intrusion through eventual data breach - if that threat actor is left undetected. The modern approach to cybersecurity requires a focus on reducing MTTD and MTTR, where threats are detected and killed early in their lifecycle, thereby...
Organizations need to take a well-considered, structured approach to integrating IoT into existing information risk management processes to address security, Gartner's Ganesh Ramamoorthy explains in an in-depth interview.
Leading the latest edition of the ISMG Security Report: a report on FBI Director-Designate Christopher Wray's admission that he faces a steep cybersecurity learning curve. Also, the U.S. government restricts use of Moscow-based Kaspersky Lab Software. Is that a smart move?
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
The working group set up by the ministry of finance has released its recommendations for shaping the computer emergency response team in the financial sector, prescribing an exhaustive cybersecurity framework to help organizations prevent breach incidents.
Realizing the need to be proactive in combatting cyberattacks, more organizations are taking a new approach to security operation centers, transforming them into cyber defense centers. What technologies play a key role?
What factors are security leaders weighing today when making decisions about investments to protect their organizations tomorrow? Neustar's Joseph Loveless comments on results of ISMG's new Strategic Cybersecurity Investments Study.
A former Qualys customer for more than a decade, Mark Butler is now the company's CISO. And one of his jobs is to help spread the word to other security leaders about the vendor's vulnerability management solutions.