9 critical controls for today's threats
Many controls we've used for years can't effectively deal with today's threats. We must extend some and add others to prevent, detect, and respond to emerging threats to our business operations.
Many controls we've used for years can't effectively deal with today's threats. We must extend some and add others to prevent, detect, and respond to emerging threats to our business operations.
In the last few years, security practitioners have become quite vocal over their belief that the perimeter is dead. You need not look very far to see the evidence of this: Breaches hit the headlines on a weekly basis, and more and more vendors are switching their tag lines from impervious defence towards faster detection and response.
Michael Lee | 11 Apr | Read more
Peter Cooper of the GWA Group has an extensive history as a senior information security professional. One morning a few years ago some strange things were being noticed at a warehouse at the company worked for. Nothing that looked too severe but the sort of thing that looked like an innocuous anomaly.
Anthony Caruana | 09 Jun | Read more
HP and FireEye have announced a partnership to make incident response, compromise assessment and threat detection offerings available to HP Enterprise Services’ most strategic clients globally.
Anthony Caruana | 02 Jun | Read more
Big business and government need to invest in data forensics and skills if they intend on fending off targeted attacks, according to analyst firm Gartner.