Top cybersecurity concerns for every board of directors, part two: people

The greatest virtual threat today is not state sponsored terrorism, newfangled clandestine malware, or a hacker culture run amok. The most dangerous looming crisis in information security is instead a severe cybersecurity labor shortage— expected to reach 1.5 million job openings by 2019. SG recently teamed up with the Information Systems Security Association and conducted a survey of 437 global cybersecurity professionals, resulting in a recently published research report, presenting an alarming picture of the languishing state of the cybersecurity profession. In one particularly salient note, 55% of the 437 cybersecurity professionals surveyed strongly believe that, “The cybersecurity skills shortage is a far bigger problem than is being communicated.”

Spotlight

i-Sprint Innovations

i-Sprint Innovations (i-Sprint) is a premier Identity, Credential and Access Management Solutions provider for global financial institutions and high security sensitive environments. i-Sprint maintains the highest value and reliability rankings among its clients, and is one of the most recognized names in the financial world. Our world leading security solutions include a proven and secure E2E Encryption (E2EE) Authentication and Data Protection for convenient (Single Sign-On) and secure access to internet banking applications. Our solution meets Internet Banking Security Guidelines from regulatory agencies in multiple countries; overcoming the security challenges of most internet and mobile banking solutions. We deliver bank-grade versatile strong authentication (biometrics, multi-factor authentication and more) and token management platform to secure multiple application delivery environments (web, mobile and cloud) based on a common security platform.

OTHER WHITEPAPERS
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

Data Services Cloud Console Security Guide

whitePaper | March 2, 2023

Cloud-based management from Hewlett Packard Enterprise offers many advantages for both data infrastructure and the data itself. Data Services Cloud Console (DSCC) is the HPE cloud-based application for current and future data and storage management.

Read More
news image

2023 Cloud Security Trends | Sponsored by AWS Marketplace

whitePaper | January 18, 2023

In the past few years, major cloud providers are improving their security controls for customers and increasing visibility into their security solutions. Emerging trends such as endpoint detection and response and Zero Trust have focused the security community on the capabilities and services of both cloud and solution providers.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More

Spotlight

i-Sprint Innovations

i-Sprint Innovations (i-Sprint) is a premier Identity, Credential and Access Management Solutions provider for global financial institutions and high security sensitive environments. i-Sprint maintains the highest value and reliability rankings among its clients, and is one of the most recognized names in the financial world. Our world leading security solutions include a proven and secure E2E Encryption (E2EE) Authentication and Data Protection for convenient (Single Sign-On) and secure access to internet banking applications. Our solution meets Internet Banking Security Guidelines from regulatory agencies in multiple countries; overcoming the security challenges of most internet and mobile banking solutions. We deliver bank-grade versatile strong authentication (biometrics, multi-factor authentication and more) and token management platform to secure multiple application delivery environments (web, mobile and cloud) based on a common security platform.

Events