By Kris Lovejoy

March 17, 2017

In today’s threat landscape you either hunt or you’re hunted. As organizations around the world are dealing with the sophistication of today’s hackers, they are recognizing that proactive approaches are needed to address advanced cyber threats. In many cases, they are turning to new concepts like cyber hunting.

Read more ...

By Katherine Teitler

March 16, 2017

I’ve got spies

Concern around data privacy is on the rise. In the U.S., the Snowden revelations ratcheted up the noise on a consumer level, and the U.K.’s General Data Protection Regulation (GDPR) is forcing companies worldwide to think more seriously about data privacy (in addition to protection). Privacy is oftentimes conflated with security since both areas have a responsibility to keep private data private. However, in reality, these are separate functions with individual duties, though the success of a privacy program is largely dependent on a strong partnership with security, says Kevin Haynes, Chief Privacy Officer at the Nemours Foundation.

Read more ...

By Randall Brooks

March 15, 2017

Challenges with development for the cloud

Application exploits have become daily news, and as a result, application security and secure coding are developing focus areas of cybersecurity. While the industry has talked about application security and secure coding for some time, these areas have not received the attention they deserve. 

Read more ...

By Marcos Colón

March 14, 2017

The fire department typically has a response plan they can put into use when a building is ablaze, involving equipment, angles to take on the fire, and what to do after the flames have been put out. The same goes for a SWAT team responding to any tactical emergency that warrants their attention, or a public relations agency that steps in when a celebrity or brand is in danger following a controversial event.

Read more ...

By Katherine Teitler

March 13, 2017

We can work it out

A new study published by BAE Systems highlights the disconnect between C-level executives and IT decision makers when it comes to perceptions of cybersecurity within the enterprise. The report, based on survey data from 221 C-level executives and 984 IT decision makers across the globe, compares the two groups’ concerns about cyber attacks, their companies’ capabilities in handling threats, and what is required to defend the enterprise more effectively.  

Read more ...

By Katherine Teitler

March 8, 2017

It's a mistake

Anyone who has worked in a corporate environment for any appreciable amount of time has been asked to give a presentation of one sort or another. Regardless of role or responsibilities, you’d be hard pressed to find a professional that hasn’t, at some point, worried over the details of what he or she was going to say and how to put together the best and most appropriate accompanying visual aid.

Read more ...

By Gary Sheehan

March 8, 2017

Resiliency sounds like a common-sense approach to business. Each organization must anticipate, prepare for, and adapt to change and disruptions in order to survive and prosper. Who wouldn’t want to do that, right? But like many things in the real world, moving from theory to executional excellence is a bit more complex.

Read more ...

By Marcos Colón

March 3, 2017

Cyber attackers have figured out how to take organizations down within seconds. Gone are the days when they’d penetrate a network and scour it for valuable information to siphon. Now, it’s as easy as leveraging one piece of malware to seize the entire trove of data and hold it for ransom. 

Read more ...

By Katherine Teitler

March 2, 2017

We’ve only just begun

On March 1, 2017, New York State became the first state in the nation to impose cybersecurity-specific regulation on financial services organizations operating within its borders. According to the press release on the Department of Financial Service’s (DFS’s) website, dated February 16, 2017, the stated aim of the regulation is to “protect New York’s financial services industry and consumers from the ever-growing threat of cyber-attacks.”

Read more ...

By Katherine Teitler

March 1, 2017

The security operations center (SOC) is a critical element of running a situationally aware and highly responsive security organization. Unfortunately, many companies today don’t have the resources to form a SOC, much less manage one that integrates seamlessly with existing security and networking teams. Companies that can fund, staff, and operate a SOC often find themselves with two separate security-focused teams—security and security operations—that present different skill sets, capabilities, reporting structures, and processes. 

Read more ...

By Ben Rothke

February 28, 2017

The 1996 movie Jerry Maguire popularized the catchphrase “Show me the money!" Skip ahead two decades and ransomware authors are shouting a virtual “Show me the Bitcoin!” While I won’t be shouting that, I will be giving a presentation on the topic, “Dealing with Cyberextortion, Ransomware, and Other Bad Stuff” at InfoSec World 2017 in April. 

Read more ...

By Katherine Teitler

February 24, 2017

Too much time on my hands

In April 2016, the European Union General Data Protection Regulation (GDPR) was approved by the EU Parliament “after four years of preparation and debate.” Compliance with the new law becomes mandatory on May 25, 2018, and given the complexities of adherence, companies are starting to scramble to put plans in place. While the law itself is an EU regulation, its impacts will be felt by any company that collects, stores, or uses data from or about EU citizens. 

Read more ...

By Katherine Teitler

February 23, 2017

Imagine

In biology, it is well known that genetic diversity creates strength in that it helps build resilience to disease, disorders, and other human ailments. At a community level, we also find strength in diversity. Individuals from different backgrounds, experiences, upbringings, geographies, cultures, races, and religions all contribute ideas, talents, and skills that make us stronger as a group. 

Read more ...

By Katherine Teitler

February 21, 2017

Whataya want from me?

We’ve all heard about the security staffing shortage; it attracts a lot of press and is hard to ignore. If you’re currently working for an organization that is not hiring, you, yourself, might be receiving regular calls from recruiters about one of the estimated 1 million open positions. Maybe you’re even covertly scoping out your next job opportunity. 

Read more ...

By Marcos Colón

February 16, 2017

As risks associated with critical assets have evolved over time, so has the role of the CISO. While some security professionals have climbed the ranks based on their technical know-how, it’s the transition into the business leadership role that tends to present the challenges for chief security officers. 

Read more ...

By Kerry Anderson

February 14, 2017

This decade has emerged as the "decade of the cloud." While cloud has technically existed in earlier forms—application service providers and hosted solutions, for instance—for almost twenty years, the current cloud marketplace offers a wide selection of services designed to meet the requirements of organizations looking to outsource certain aspects of operations.

Keep reading...

Event Search

Download Catalog Dark Blue 300x58

Subscribe to Newsletter LightBlue 2 300x58

Register Adv. Persistant Threat 300x58

MIS|TI Tweets

ACL MISTI Grey 300x58

Please choose your region

Submit
Select a Region
United States
United Kingdom/Ireland
Africa
Americas
Asia-Pacific
Europe
Middle East

By continuing to use misti.com you will be agreeing to the website Terms and Conditions, the Privacy Policy, and the Use of cookies while using the website.