What's Your DNS Security Risk? Insights from Recent Ponemon Survey

Vanguard Group

Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into: The level of visibility these organizations have, especially in today’s complex network deployments. Their use of threat intelligence and the effectiveness of threat intelligence. The efficiency of their security operations.
Watch Now

Spotlight

Over the past several years, there has been intense focus by governments and industry on the potential for cyber attacks on critical infrastructure. Recent events show us that the focus is essential. What is “critical infrastructure?” In his February 12, 2013, Executive Order—Improving Critical Infrastructure Cybersecurity, 1 President Obama borrowed a definition from the USA Patriot Act of 2001, stating that it is “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” This would include such things as telecommunications systems, public health systems, transportation systems, power generation and delivery, water supply, financial services, food production and distribution, government, and public safety.

OTHER ON-DEMAND WEBINARS

Cybersecurity webinar series - IT security under attack

"A single vulnerability is all an attacker needs"~ A cybersecurity saying that fits with the facts even till date. Security incidents frequently make the headlines, and it is always a surprise when the walls of highly protected infrastructures are breached. More often than not, when security attacks happen on organizations, investigative reports only reveal the less intrusive details, and avoid disclosing confidential information that may impact IT security.
Watch Now

Understanding privacy regulations and compliance

Baker Tilly

Data is among an organization’s most valuable assets. Its management and protection should be viewed as a mission-critical stewardship rather than mere compliance. Larger and more costly cybersecurity incidents coincide with annually increasing regulatory and liability pressures. Looming U.S. privacy legislation on the horizon coupled with the General Data Protection Regulation’s impacts (Google recently received a $57 million fine), intensifies pressure on organizations to understand their legal compliance obligations and to safeguard private information.
Watch Now

Securing Organizations from Remote Desktop Protocol Exploits

HealthcareInfoSecurity

Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now

5 Reasons why a people-centric security strategy safeguards sensitive information and facilitates compliance

Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achieve and maintain compliance, and to encour
Watch Now

Spotlight

Over the past several years, there has been intense focus by governments and industry on the potential for cyber attacks on critical infrastructure. Recent events show us that the focus is essential. What is “critical infrastructure?” In his February 12, 2013, Executive Order—Improving Critical Infrastructure Cybersecurity, 1 President Obama borrowed a definition from the USA Patriot Act of 2001, stating that it is “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” This would include such things as telecommunications systems, public health systems, transportation systems, power generation and delivery, water supply, financial services, food production and distribution, government, and public safety.

resources