While insurance companies and corporate boards of directors debate the benefits and drawbacks to buying yet more insurance – this time cyber liability insurance – the biggest gotcha that companies will face might well lie in the dictionary rather than in the policies themselves.
SC Congress New York keynote speakers Angelo Prado and Xiaoran Wang, both from Salesforce.com, used demonstrations and code displays to reveal just how vulnerable modern browsers are to attacks.
Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers doing to ensure protection?
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
The decision to move to the cloud has always been wrought with anxiety over entrusting one’s data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Instead of spending billions of dollars to supply massive armies, today’s adversaries hire code-writers to create attacks that run autonomously for years with little or no human intervention.
In today’s environment, potential attackers have all the time they need to mount a sustained intrusion against a target company or government agency. While companies need to understand past attacks so they don’t happen again, it is crucial to look forward and protect data against future breaches. And, one way to achieve this is to put a greater emphasis on embedding security directly into enterprise data to stop outsider attacks, and to make data that is compromised unreadable and unusable. A number of other strategies are explored as well in this latest ebook from SC Magazine.