After partnering with Masergy, a financial services company was able to downgrade their cyber security risk status from yellow to green. These tactics helped lower their cyber insurance premiums.
The recent surge of data breaches indicate a new security approach is needed to keep sensitive information safe. Managed Detection and Response can help overwhelmed enterprise IT and security teams fill the gap.
Masergy's patented Unified Enterprise Security platform was specifically designed to identify the anomalous lateral movements that undoubtedly took place inside the NiceHash network.
If you do business in the European Union — even if your organization is based elsewhere — get ready. The EU’s upcoming General Data Protection Regulation (GDPR) delivers a long list of what one international law firm calls “onerous obligations.”
The world of cyber security is an asymmetric battleground. The attack surface is growing as a result of the growing number of connected devices, malicious apps, the Internet of Things, cloud services and the digitization of business functions...
There is a cyber arms race going on and the bad guys appear to have the lead. Cyber criminals recently hacked the U.S. Democratic National Committee, exploiting flaws in both Windows and Adobe Flash. Hackers took down Twitter, Spotify and Reddit in the recent massive distributed denial-of-service (DDOS) attack.
In cyber security, many traditional defenses are being outpaced by advanced threats. That's why several cyber-defense organizations are developing non-traditional detection techniques.
Crypto-segmentation is a new approach to protecting applications and the data they access from hackers who have become adept at penetrating corporate systems.
Most CEOs and CISOs already know that cyberattacks can cost their organizations a lot for technical investigation, mediation and cyber security improvements.
Keeping your organization’s IT systems safe and secure has never been more difficult. Companies are under increased threats from a variety of cyber threats.
Enterprise BYOD programs are becoming more sophisticated and mature as employee usage of mobile devices continues to rise exponentially. BYOD security risks are also of growing concern.
Ransomware has been much in the news due to the dangerous escalation in these types of attacks. Much attention has focused on healthcare attacks but all industries are vulnerable.
Every CIO knows about the high cost of cyber security. You’ve probably also experienced the skyrocketing salaries that security experts are demanding.
If you’re looking for a scary story, put down the H.P. Lovecraft novel and pick up the 11th edition of The Global Risks Report 2016, courtesy of the World Economic Forum.
CISOs whose companies do business in Europe will soon have to review and in all probability update their security infrastructure and processes in response to the European Union’s Cyber-Security Directive that was released last month.
The European Union (EU) recently passed some of the most aggressive data privacy regulations in existence.
Recent cyber breaches of federal agencies and high profile financial companies signal a new wave in cyber warfare and speaks to the need for all organizations to rethink their approaches to security.
The risk of cyber security threats is growing exponentially and failure to address it in a concerted way can result in serious consequences.
TrueCrypt, the popular cross-platform disc encryption tool, might be secure after all, according to the Open Crypto Audit Project.
The PCI Security Standards Council notified security professionals that the SSL protocol no longer meets the definition of "strong cryptography." Here’s why and some suggested next steps