What is the Greatest Cybersecurity Threat: Insiders or Outsiders?

January 16, 2017

In a short two years, it is safe to say that the prospect of cybercrime has suddenly shifted to be a top concern for many decision makers around the world. It started with the explosive hacks that rocked companies like Sony, JP Morgan, Target, and other well-known brands. More recently, it was the release of thousands of hacked emails from the DNC and John Podesta, along with the allegations of Russian hacking, that has led the news cycle. As a result, it is not surprising that much of today’s narrative on cybercrime is centered around the devastating potential of external threats to countries or businesses. The reality is, however, that there is a whole other side of things to consider.

Spotlight

Code Dx

Code Dx® 2.0 is a software vulnerability management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SAST) and dynamic application security testing (DAST) tools, as well as the results of manual code reviews. Its visual analytics accelerate the finding, triage, prioritizing and fixing of software vulnerabilities to dramatically expedite remediation. The Code Dx product was partially funded by the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate due to the dire need to increase software assurance for critical infrastructure and secure the country’s software supply chain.

Other Infographics
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Cybersecurity in Retail Infographic

Infographic | February 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer.

Read More
news image

2019 Cyber Etiquette: A Guide To Today’s Top Cyber Threats

Infographic | December 20, 2019

The best detection and response solutions provide deep visibility to secure and investigate potential risk. Greater automation and contextualization of security events brings more informed decision-making, faster triage and effective remediation of threats.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

Ransomware Statistics and How to Protect Your Business

Infographic | March 9, 2022

Ransomware Is One of the Most Common Malware Threats. Average ransomware payment in 2021 increased by 82% year over year to $570,000.

Read More

Spotlight

Code Dx

Code Dx® 2.0 is a software vulnerability management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SAST) and dynamic application security testing (DAST) tools, as well as the results of manual code reviews. Its visual analytics accelerate the finding, triage, prioritizing and fixing of software vulnerabilities to dramatically expedite remediation. The Code Dx product was partially funded by the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate due to the dire need to increase software assurance for critical infrastructure and secure the country’s software supply chain.

Events