article thumbnail

Managing risk by understanding attack surfaces

Network World

At ShmooCon 2017, CSO's Steve Ragan sits down with Gabe Bassett, senior information security data Scientist at Verizon Enterprise Solutions. The two discuss how attack surfaces work within the Verizon Data Breach Investigations Report (DBIR) and how companies can use those to assess their risk profiles.

article thumbnail

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Network World

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

Significantly, improper use incidents—which result from a violation of an organization's acceptable use policies, such as installing unapproved software or viewing inappropriate material—increased the most, from 249 in 2017 to 1,103 in 2020, a 343 percent growth. 6 key areas where NASA's information security is failing.

article thumbnail

Class of 2017 Yearbook: The Premier 100 Technology Leaders

ComputerWorld IT Management

Class of 2017 Yearbook: The Honorees. Carlos Selonke Head of platform strategy and enterprise architecture Santander US. Showalter Chief health information officer University of Mississippi Medical Center. Scott Spradley CIO and senior vice president Hewlett Packard Enterprise. Dimitris K. Ambs CIO City of Albuquerque.

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Kevin: This time, however, I'd like to really talk to you about this security perimeter thing. Cloud mobility and the internet things have really obliterated what I've always referred to as the wall and moat security paradigm, where working inside the enterprise was safe but working outside of the company's walls wasn't.

article thumbnail

Business transformation proves to be catalyst for cybersecurity spending

ComputerWorld IT Management

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Cohen was most recently CFO for ANGI Homeservices, a digital marketplace created when home improvement directories Angie’s List and HomeAdvisor merged in 2017. Sedlock was most recently chief growth officer at EPSi and spent more than a decade at Mediware Information Systems. Based in Denver, Colo., states and 18 countries.

Groups 83