The number of cyberattacks continues to rise and organisations need to come to terms with the fact that traditional approaches to mitigating the effects of malicious attacks may no longer be viable. One of these approaches is to harness the power of big data technology to help companies improve their proactive and reactive cyber-defence capabilities. David White and Annie Tu examine how old approaches may be found wanting and a paradigm based on new defence models can help companies not only stop hackers, but also help to better identify and respond to malicious activities.
In this article, we examine the role of International Standards Organization (ISO) standards, and how standards are important for an incident and data breach response plan.
Enterprise security will always face complex challenges. But by taking a holistic approach to incident resolution, SOC leaders can leverage the right personnel and speed major incident resolution. Collaboration across teams can increase efficiencies and optimize their collective incident response today and tomorrow.
Recent data breaches at Under Armour and Panera Bread has been making headlines. But the approach taken to mitigate the threat to consumers could not have been more different. One is a lesson on best practice and the other is a cautionary tale on how not to handle malicious attacks aimed at seizing consumer data.
A Security Information and Event Management (SIEM) can play an important role in GDPR compliance. It can serve as a centralized point for all data collection and analysis, and offer intelligent insights into malicious behavior so you can be alerted of security incidents before they become an impactful data breach.
Google admitted that back in March 2018, it became aware of a data breach that may have impacted up to 500,000 users, but failed to disclose it to users or regulators. Are big Silicon Valley tech giants are “too big to trust”?
Data breach events are a now harsh reality. But when managed properly and communicated strategically, companies can emerge with both their corporate reputation and the confidence of their consumers intact. Find out how in this in-depth article.
Data recovery and protection planning is a crucial task and responsibility for any data center manager, and it is important in creating buoyant infrastructures. What are the crucial steps to formulate an effective plan?
Just like any business plan, a business continuity plan is incredibly important to make sure your business continues to functions optimally after facing a disaster scenario. Learn the six steps for a effective BCP.
User activity monitoring and insider threat detection is evolving to get ahead of the ever increasing threat to user data. Providing advanced analytics, insightful intelligence, and effective response mechanisms, it addresses three critical components of data security in 2019.