In recent years, many leading companies have fallen victim to high-profile cyberattacks and data breaches. Cybercriminals and hackers around the world develop new methods and techniques to break into and compromise even the most advanced security systems and gain access to sensitive information. This has led to the exposure of
Every security product in the last 20 years has been built to identify attacks after they have been executed. Look no further than then one of the hottest categories in cybersecurity — endpoint detection and response (EDR) — to see the proof. By its very name, this solution is only
According to a new report by Nikkei after viewing Ministry of Defense plans, the Japanese military is set to add hundreds of new cybersecurity specialists to its forces due to current aggression from hostile nations. The report revealed that as of 2020, there was 660 cybersecurity personnel in Japan’s Self
In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.
In cybersecurity, it has long been assumed that the attacker has the advantage and that defenders must deploy a disproportionate amount of resources (time, money, etc.) to even try and maintain some parity. In this piece, we’ve conducted interviews with two successful CISOs to provide insight into how they view security alpha issues. Mark Weatherford is a highly experienced and successful CISO who has worked in the public sector at both the state and federal level and also as a CISO for multi-billion dollar commercial organizations. Our Global FS CISO currently works as the Global CISO at one of the largest financial services firms in the world and has 25 years of experience working on cybersecurity and risk management issues.
Their responses provide direct insight into how they work to improve the ROI of their program and increase attacker cost.
Almost three in four (72%) security professionals have thought about quitting their jobs over a lack of resources at their organization. Almost eight out of ten (79%) companies suffer from skills and or technology shortages. The survey also shows that infosec pros actually list security staff shortages (50%) and security
A new study by Securitas indicates that for many organizations, physical threats are at least as important as cyber threats. It also confirms that insider threats are a massive problem, with 75% of the biggest security threats referring to activity that likely involves people within the targeted organization. The five
F-Secure observed a 32% increase in attack traffic last year compared to 2017, and the second half of 2018 saw four times more attack traffic than the first half. Moreover, the security company found that 22% of its client organizations completely failed to detect attacks against their networks and many
Consulting company Booz Allen has released a new report outlining eight crucial cyber threats for this year, based on insights from the firm’s top analysts. The research outlines the following threats, while also discussing what companies can do to protect themselves: Information warfare will increasingly target organizations Internet of Things (IoT) devices
The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to