CFOtech UK - Technology news for CFOs & financial decision-makers

Cybersecurity strategy stories - Page 5

Cyber warfare

Companies not utilising threat hunters correctly – study

Tue, 17th Dec 2019
#
advanced persistent threat protection
#
cyber threat
#
study
ThreatQuotient study reveals confusion over the role of threat hunters, with many teams focusing on reactive processes.
Cybersecurity26

75% of DevOps professionals say certificate issuance policies slow them down

Mon, 16th Dec 2019
#
devops
#
apm
#
software development
Less than half of DevOps professionals believe developers always request certificates that serve as machine identities through authorised channels.
Cybersecurity35

Business security performance impacting bottom line - Thycotic

Mon, 2nd Dec 2019
#
pam
#
apm
#
software development
When cybersecurity teams do not meet their targets, it impacts the CEO with longer hours, job insecurity, shareholder pushback, and bonus reductions.
Cybersecurity25

How user-centred design is reshaping cybersecurity

Tue, 12th Nov 2019
#
devops
#
martech
#
multi-cloud
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Digital globe11

Forcepoint increases cloud security presence to cover 128 countries

Thu, 17th Oct 2019
#
endpoint protection
#
cloud security
#
casb
This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities.
Cybersecurity24

Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass

Thu, 3rd Oct 2019
#
casb
#
report
#
bitglass
A Bitglass report reveals that 77% of Fortune 500 companies lack transparency in cybersecurity roles, with just 62% having a Chief Information Security Officer.
Screen shot 2019 05 16 at 10

General staff don't get tech jargon - expert says time to ditch it

Thu, 16th May 2019
#
phishing
#
email security
#
cybersecurity
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Cyber warfare

Security professionals want to return fire – Venafi

Wed, 20th Mar 2019
#
devops
#
apm
#
software development
Seventy-two percent of professionals surveyed believe nation-states have the right to 'hack back' cybercriminals.
Untitled design  1

How business leaders must prioritise cyber risk - Palo Alto Networks

Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Cyber attack   global

How protecting critical infrastructure starts with securing social media

Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Cyber attacker2

Companies swamped by critical vulnerabilities – Tenable

Fri, 9th Nov 2018
#
report
#
cybersecurity strategy
#
tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Cybersecurity9

The key pillars of strong cybersecurity strategies

Fri, 2nd Nov 2018
#
devops
#
multi-cloud
#
iam
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Cybersecurity breach2

LogRhythm reports higher-than-anticipated SOAR adoption rate

Thu, 1st Nov 2018
#
siem
#
logrhythm
#
cybersecurity strategy
LogRhythm sees a significant surge as 33% of customers adopt its SOAR capabilities, outpacing Gartner's 2018 SOAR adoption estimates.
Industrial

More OT devices added to Tenable's industrial security offering

Fri, 19th Oct 2018
#
cybersecurity strategy
#
security week
#
ot
Tenable has expanded its asset discovery and vulnerability management solution to include thousands of new OT devices, enhancing industrial security.
Gdpr3


GDPR compliance: Looking beyond the hype

Wed, 17th Oct 2018
#
data protection
#
data privacy
#
opinion
Six months post-GDPR, we demystify compliance myths and provide key insights to navigate the data regulation maze.
Keith casey

Exclusive: Cybersecurity in the API economy

Mon, 15th Oct 2018
#
risk & compliance
#
okta
#
opinion
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Oil refinery

Industrial control systems: How to approach OT cybersecurity

Tue, 9th Oct 2018
#
risk & compliance
#
opinion
#
cybersecurity strategy
To secure facilities, operational technology and IT security must come together. PAS Global spoke to industry experts for their strategies.
Bunker

Carbon Black: Is your cyber panic room ready?

Fri, 5th Oct 2018
#
carbon black
#
opinion
#
cybersecurity strategy
Cybersecurity expert warns of a 'cyber winter' with a surge in destructive attacks, urging digital 'panic rooms'.
Dell emc

Cybersecurity for dummies: How to minimise the risk of data loss

Mon, 24th Sep 2018
#
kaspersky
#
cybersecurity strategy
#
kaspersky cyber security weekend
Amid rising cyber threats and costly data breaches, Kaspersky Lab advises enhanced cyber hygiene to safeguard valuable digital assets.
Ben desjardins

Exclusive interview: RSA on the road to AI security

Mon, 27th Aug 2018
#
ai
#
ml
#
rsa security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.