Ten security controls for effective cybersecurity

ManageEngine

Security experts have predicted that this year's cyberthreats will be far worse than last's, with ransomware, DDoS, phishing, and cryptojacking attacks becoming even more sophisticated. Faced with an increase in cyberattacks and strict compliance regulations—like the EU's General Data Protection Regulation (GDPR) and the UK's Data Protection Bill—enterprises need to act now and implement practice best security measures.
Watch Now

Spotlight

With the universal presence of short-range connectivity technologies (e.g., Bluetooth and more recently, Wi-Fi direct) in the consumer electronics market, the Delay Tolerant-Network (DTN) model is becoming a viable alternative to the traditional infrastructural model. Proximity malware, which exploits the temporal dimension and distributed nature of DTNs in self-propagation, poses threats to users of new technologies. In this paper, the authors address the proximity malware detection and containment problem with explicit consideration for the unique characteristics of DTNs.


OTHER ON-DEMAND WEBINARS

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Building Blocks for Your IT Security Program

AT&T Cybersecurity

Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.
Watch Now

Adjusting in Mobile, Social and New Threat Environments

While many large enterprises resist change by simply exerting control over their users, others realise they must remain both agile and flexible to the changing technology environment where usage of mobile, social and end user productivity apps are loosening controls on corporate data. In this session, David Lomax, Director of Sales Engineering EMEA Barracuda Networks, will lead a discussion on how forward-thinking businesses can implement security and storage strategies to balance the needs of their users with security. Topics will include usage of next generation firewalls, secure Web gateways, Web application firewalls, MDM, and other security technologies and their use in physical, virtual and pure cloud environments
Watch Now

DDoS Attacks Are a Serious Threat to U.S. Companies, Not for Reasons You'd Think

Neustar, in its annual DDoS Attacks Report shares critical DDoS trending data from real companies from across industries. Learn how companies are ramping up DDoS protection tactics and why
Watch Now

Spotlight

With the universal presence of short-range connectivity technologies (e.g., Bluetooth and more recently, Wi-Fi direct) in the consumer electronics market, the Delay Tolerant-Network (DTN) model is becoming a viable alternative to the traditional infrastructural model. Proximity malware, which exploits the temporal dimension and distributed nature of DTNs in self-propagation, poses threats to users of new technologies. In this paper, the authors address the proximity malware detection and containment problem with explicit consideration for the unique characteristics of DTNs.

resources