Top cybersecurity concerns for every board of directors, part two: people

The greatest virtual threat today is not state sponsored terrorism, newfangled clandestine malware, or a hacker culture run amok. The most dangerous looming crisis in information security is instead a severe cybersecurity labor shortage— expected to reach 1.5 million job openings by 2019. SG recently teamed up with the Information Systems Security Association and conducted a survey of 437 global cybersecurity professionals, resulting in a recently published research report, presenting an alarming picture of the languishing state of the cybersecurity profession. In one particularly salient note, 55% of the 437 cybersecurity professionals surveyed strongly believe that, “The cybersecurity skills shortage is a far bigger problem than is being communicated.”

Spotlight

Super Star Technologies Pvt. Ltd

Super Star Technologies Private Limited is managed by two seasoned antivirus industry professionals having more than 15 years of IT security domain experience. Recognizing the tremendous opportunity in the IT security industry where no other existing player caters to the exact need of the end users, Super Star aims at providing customers value for their money.

OTHER WHITEPAPERS
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More

Spotlight

Super Star Technologies Pvt. Ltd

Super Star Technologies Private Limited is managed by two seasoned antivirus industry professionals having more than 15 years of IT security domain experience. Recognizing the tremendous opportunity in the IT security industry where no other existing player caters to the exact need of the end users, Super Star aims at providing customers value for their money.

Events