ISE® Northeast 2018
The Fake Email Crisis 6.4 Billion Fake Messages Every Day > Download Whitepaper
The crisis of fake email continues. Far from being merely a “social engineering” issue, fake email is a direct result of technical issues with the way email is implemented: It lacks a built-in authentication mechanism making it all too easy to spoof senders. However, this problem is also amenable to a technical solution, starting with the email authentication standards DMARC, SPF, and DKIM.
For the purposes of this report, Valimail used proprietary data from our analysis of billions of email message authentication requests, plus our analysis of more than 3 million publicly accessible DMARC and SPF records, to compile a unique view of the email fraud landscape. Now in its third consecutive quarter, our report shows how the fight against fake email is progressing worldwide, in a variety of industry categories.
Attivo Networks - ThreatDefend > Download Whitepaper
We had intended to include Attivo Networks’ ThreatDefendTM Detection and Response Platform in our deception networks group but after looking pretty closely at it we decided that it is quite a bit more than a deception grid. It is true, of course, that this system includes BOTsink, a deception tool that is both effective and well-known. But BOT- sink is just part of the story. This is a full-fea- tured incident response system.
The Transparent managed security handbook > Download Whitepaper
At Expel, we're radically transparent - not just with how our service works but also with the way we do business. We hope that's immediately observable.
Eight components to develop a successful insider risk program > Download Whitepaper
While the term “insider threat” has garnered much recognition over the past few years, its applicability to commercial industry has not received the same acceptance as with the government sector. With the commercial industry facing an increasing number of attacks, and employees having greater access to information than ever before, this lack of acceptance can no longer remain the status quo.
Case Study: Protecting Aaron’s, Inc. Applications With Prevoty > Download Whitepaper
Headquartered in Atlanta, Aaron’s, Inc. is a 3.2 billion dollar omni-channel provider of lease-purchase solutions that was founded in 1955 and has been publicly traded since 1982. Aaron’s, Inc. owns the brands Aaron’s, Progressive Leasing and HELPcard. The company sells and leases furniture, consumer electronics, home appliances and accessories through more than 1,860 company-operated and franchised stores in 47 states and Canada and its e-commerce platform Aarons.com. Progressive Leasing, a virtual lease-to-own company, provides lease-purchase solutions through approximately 19,000 retail locations in 46 states. The company’s second-look credit arm, HELPcard, provides a variety of credit products that are originated through a federally insured bank.
With Qualys Cloud Platform > Download Whitepaper
The cyber security world is a noisy place. CISOs get bombarded daily with information, including the latest research studies, threat warnings, vendor announcements, industry and regulatory mandates, best practice controls and hacking incident reports.
Saltworks application security services > Download Whitepaper
Whether it’s enterprise, web, or mobile, the two most important aspects of any application are quality and security. By integrating security into your existing software development lifecycle, software can be developed and released rapidly while maintaining appropriate security practices. The need to build secure applications has never been more important. Automated attack and compromise tools easily detect vulnerabilities in web, cloud, and “as-a-service” applications. The potential financial and legal liability can be devastating.
Graphic Novel: Through the Looking Glass Table > Download Whitepaper
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet — did they have help from the inside?
Discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can get anyone — ranging from IT managers to the most sophisticated SOC analysts — ahead of the game, so they can better understand and respond to incidents, breaches, phishing attempts, insider threats and more.
Artificial intelligence in cybersecurity > Download Whitepaper
How to augment security operations centers with artificial intelligence. This white paper examines obstacles that enterprises face in combating cyberattacks, and how artificial intelligence is essential to modern security operations centers. AI can augment SOC teams to make operations more efficient, as well as detect the early signs of attacks in real time before key assets are stolen or damaged.
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANA GEMENT > Download Whitepaper
Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations cannot afford to neglect vulnerability management and still expect to maintain system availability and protect sensitive data. As part of a defense-in-depth security strategy, the best approach is proactive: Identify vulnerabilities and weaknesses before security issues arise.
Employee Benefits Organization Reduces Phishing Susceptibility by More Than 89% > Download Whitepaper
Wombat’s assessments and education modules are core components of the organization’s security awareness and training program
In early 2015, a retirement benefits organization for public employees in the western United States was researching options for security awareness training. As part of that process, the association wanted more insight into its level of phishing susceptibility.
GISO - Citi Global Functions
Gone Phishing: Securing the Enterprise from Social Engineering Email Attacks > Summary
The tried and true digital medium of communication, email, is rooted in sharing personal and professional data, and continues to be a favorite target for cyber-criminals because the internet offers a virtual treasure trove of readily accessible information. The very nature of how information is shared through email on both a casual and professional basis in the modern age goes against many longstanding core information security principals. That is why phishing, one of the oldest social engineering attacks in the book, continues to succeed. Though it is an incredibly well-known technique, businesses of all shapes and sizes are still targets of successful phishing attacks. It is critical for security teams to learn how they can keep up to date on these attacks and secure their workplace from email phishing. What else needs to be done to ensure the enterprise at large is aware of the dangers and pitfalls of these threats?
The Increasing Impact of Insider Threats > Summary
Insider threats continue to be one of the top cyber security threats and have proven that they are a force to be reckoned with. According to a 2017 Insider Threat Report, 53% of companies estimate remediation costs of $100,000 and more, with 12% estimating a cost of more than $1 million. The same report suggests that 74% of companies feel that they are vulnerable to insider threats, with 7% reporting extreme vulnerability. Every company will face an insider-related breach sooner or later regardless of whether it will be caused by a malicious action or an honest mistake. As costs related to insider threats continue to grow, what can Information Security Executives and their security teams do to combat this all too familiar foe?
Vice President, Information Security and Privacy
CyberVista | Graham Holdings
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
Turning the Tables with Deception-Based Security > Summary
In recent years, deception-based security has become one of the most talked about and prominent information security solutions on the market. Having evolved far beyond the humble honey pot origins of yore, modern deception technology can be deployed in a number of ways across the enterprise. From larger scale network models to deception solutions focused on endpoints, applications, and data, there now exist a plethora of ways that companies can shape deceptive security solutions to fit their needs. As attackers continue to become more aggressive and deceptive in their methods of attack, it’s imperative that security teams are able to also make the best use of deception to combat against them. If deception can be used to attack, it can also be used as a means of defense.
JP Morgan Chase & Co.
Evolving the SOC Through Security Orchestration > Summary
Security teams not only face an ever-expanding threat landscape, but they also contend with a variety of operational challenges. Proliferation of disparate security tools. Staffing shortages. Lack of documented, repeatable processes. The result is that nearly half of daily security alerts go uninvestigated. Security orchestration platforms can act as the catalyst for significant improvement in day-to-day security operations and in creating internal consistency between NOCs and SOCs. Because of the centralized approach and consolidated view security orchestration solutions deliver, security teams are enabled to become more efficient and effective while using fewer interfaces, improving reporting and executing highly consistent, repeatable processes.
Managing Director, Head of Cybersecurity Operating Office
MUFG Union Bank N.A.
ISE® Northeast Executive Award Finalist 2018
Outsourcing Cybercrime: Combatting Ransomware as a Service > Summary
Ransomware is certainly nothing new in the cybersecurity business, with the first instances having appeared more than a decade ago. However, this old threat has undergone some deadly changes over the last few years. The rise of the Ransomware as a Service (RaaS) distribution model gives would-be cybercriminals the means to launch a cyber-extortion business with virtually no technical expertise required, flooding the market with new ransomware strains in the process. 2017 saw an influx of potent and damaging RaaS attacks like Petya and WannaCry, both of which showed the attack model’s devastating potential to spread quickly and cause serious damage. As the use of RaaS continues to grow, Information Security executives and their security teams need to take new precautions in order to combat this new form of a familiar threat.