In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
Hot cybersecurity trends under discussion at this year's RSA Conference include artificial intelligence, facial recognition, protecting not just data but also knowledge, as well as rapid data breach response, says Chris Pierson, CEO of Binary Sun Cyber Risk Advisors.
Organizations too often prioritize data breach prevention at the expense of data breach response - or vice versa, depending on current fashion - when an emphasis on both remains mandatory, warns Art Coviello, the retired chairman of RSA.
IT administrators and business partners require privileged access to enterprise networks to ensure that business continues to get done. Yet this very same access is all too often abused by insiders and outsiders, leading to otherwise preventable data breaches, says Matt Dircks, CEO of Bomgar.
Cybersecurity pros need to apply the Darwinian approach of "survival of the fittest" to cybersecurity to navigate the risk landscape and raise the industry baseline for security, says Dan Schiappa of Sophos.
Against today's threat landscape, the security operations center takes on greater importance - and so does the movement to automation. Dario Forte of DFLabs discusses how to employ SOC automation to boost incident response.
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
Department of Homeland Security Secretary Kirstjen M. Nielsen warns that the U.S. will more aggressively move to punish those who conduct cyberattacks. Plus, the department plans to soon unveil a new cybersecurity strategy. Complacency, she says, "is being replaced by consequences."
The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.
Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.
Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.