Quantcast
Channel: The Art of the Hack
Browsing all 43 articles
Browse latest View live

2015 Cost of Cyber Crime Study: Global (Ponemon)

Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization. There is significant variation in total cyber-crime costs...

View Article



Cyber Security Best Practices

Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber...

View Article

Enterprise Security Rises to the Top of the Corporate Agenda

Discover how enterprise security solutions can help you see the big picture and outsmart cyber criminals. This report discusses important steps needed for an accurate and complete security system: 1....

View Article

SANS Maturing and Specializing: Incident Response Capabilities Needed for...

The SANS 2015 survey of the incident response capabilities of more than 500 security professionals found good news and bad news. The good news is that reported malware incidents, breaches, and...

View Article

Incident Response Capabilities Webinar

Incident response is a hot topic among the SANS audience. In SANS’ 2014 survey on Incident Response, only 9% of organizations felt their incident response process were “very effective,” yet the...

View Article


A cheat sheet for the new CISO

The first 100 days of a new job for a chief information security officer (CISO) are critical. Of course, so are the first 90 and 110. But 100 is a nice round number and long enough for the CISO or CSO...

View Article

Smart cities, dumb risks

Smart cities aren’t some figment of our cyber-future – they’re already popping up on the map. Leveraging Internet of Things (IoT) technology, urban planners are connecting everything from traffic...

View Article

Data access: How strict should you be?

Late last year, the Ponemon Institute published a research paper teasingly titled, “Corporate Data: A Protected Asset or a Ticking Time Bomb?” Given the increasing number of major data breaches, you...

View Article


CIO & CISO: Making the best of a sometimes-adversarial relationship

It may sometimes seem that CIOs are from Mars and CISOs are from Venus, but common sense dictates that they should find a way to work productively on cybersecurity issues back on Planet Earth....

View Article


The 3 scariest InfoSec threats

Cyber attacks are growing in both scope and frequency. Threats come in many flavors, from a variety of “bad actors,” and through an increasingly complex mix of devices and other access points into...

View Article

Charting the mobile malware landscape

You know those legions of smartphones and tablets marching into work with every employee? They’re a growing security concern. While attacks on mobile devices have to this point been limited and more of...

View Article

The 6 biggest InfoSec threats of 2016

It’s a new year, but security executive will find little relief battling a witches brew of old and new cyber threats. The evolving threat landscape is forcing companies to recalibrate their security...

View Article

Data security = brand security

Unresponsive service and inferior product quality are longstanding reasons why customers jump ship. Yet in today’s digital age, customers are just as likely to cut ties with a business due to trust...

View Article


Top Security Priorities In 2016

It’s 2016! What is your top enterprise security priority for the year ahead? Tell us your answer below and we’ll curate the best answers in a new article on The Art of the Hack. #df_answerstage {...

View Article

The power of predictive threat intelligence

New cyber threats are cropping up so frequently that security executives all too often are reduced to playing defense. Investing in the best available firewalls and anti-malware technology remains a...

View Article


IoT raises the volume of privacy concerns

Just as the Internet of Things (IoT) is paving the way for new product and service opportunities, it is also opening up a Pandora’s box of privacy and security concerns that present increasingly...

View Article

What’s your top security priority for 2016?

Enterprise organizations experienced an average of more than 9,100 security incidents over the past year, according to CSO’s 2016 Global State of Information Security Survey. And those are just the...

View Article


The Dark Web enters the spotlight

The Dark Web hosts a cast of shady characters and criminal activity. But it’s also a potential treasure trove of threat intelligence that can actually help CISOs bolster their cyber defense. The Dark...

View Article

The 2016 Cyber Risk Report

Hackers are finding new vulnerabilities in your IT environment and developing new ways to exploit them. To fight back, you’ve got to know what they know and understand how they attack. Cyber Risk...

View Article

2016 State of Security Operations

Hacker attacks are increasing, and the cost to businesses is growing. Experts tell us it’s not if you’ll be breached, it’s when. So the effectiveness of your security operations determines how much...

View Article
Browsing all 43 articles
Browse latest View live




Latest Images