Australia to Update National Cybersecurity Strategy

Data Breach Today

Government Invites Feedback on Addressing Cyber Challenges The Australian government is looking to update its national cybersecurity strategy by 2020.

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Risk 211

Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

Risk 191

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

Is Your AI Strategy Haunted?

Perficient Data & Analytics

Many enterprises set out with good intentions to transform their organizations with AI, but fail to deliver without a strong AI Strategy in place. A good AI strategy will take all of your organization’s use cases into account and figure out how you want to transform your business.

'Five Eyes' Intelligence Agencies Discuss Strategies

Data Breach Today

The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk

Risk 185

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

IoT 180

The US National Cyber Strategy

Schneier on Security

Last month the White House released the " National Cyber Strategy of the United States of America. And the strategy includes no details. I generally don't have much to say about these sorts of documents. They're filled with broad generalities.

Developing a PaaS Migration Strategy

Perficient Data & Analytics

In this blog we will look at the steps to create a migration strategy to PaaS including re-platforming legacy applications. Application migrations are often tied to a larger business-level, digital-transformation strategy.

China's AI Strategy and its Security Implications

Schneier on Security

Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. Gregory C.

5 steps to incorporate ethics into your artificial intelligence strategy

Information Management Resources

In the context of the five most common AI ethics guidelines, here are five lines of questioning that IT leaders should consider when determining an AI ethics strategy. Artificial intelligence Data strategy Data management

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT

Live Webinar | Hard Truths about Account Takeover and Strategies to Defend Your Enterprise

Data Breach Today

In this webinar, SpyCloud Head of Product Strategy Chip Witt will demonstrate how malicious actors take advantage of loopholes in your account takeover prevention plans. Protecting your enterprise from breaches and account takeovers has never been a bigger challenge.

FDA Reacts to Critique of Medical Device Security Strategy

Data Breach Today

Watchdog Agency Cited Deficiencies, But Agency Says Many Have Already Been Addressed The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report.

Data Strategy at Strata Data Conf New York

Perficient Data & Analytics

And to accomplish this you need a data strategy. Here are four sessions to attend to learn more about the elements of a quality data strategy. Data Strategy Sessions at Strata. Companies today are working to adopt data-driven mind-sets, strategies, and cultures.

Components of a Data Governance Strategy in Financial Services

Perficient Data & Analytics

In this post, I discuss the components needed to design a data governance strategy. A comprehensive program to manage data consists of a number of components: Data Strategy & Architecture.

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

GDPR 130

4 strategies to drive digital maturity in the digital age

Information Management Resources

Digital transformation Data strategy Data managementThe majority of digitally maturing companies are already using technology in fundamentally different ways to conduct their everyday business.

Technology Strategies to Reduce False Positives

Data Breach Today

130
130

5 requirements for success with DataOps strategies

Information Management Resources

Data strategy Data management Data discoverySimilar to DevOps, DataOps is an emerging set of practices, processes and technologies for building an enhancing data and analytics pipelines to better meet the needs of the business.

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

A Successful Strategy for Fighting Phishing

Data Breach Today

Brent Maher of Johnson Financial Group Offers Real-World Lessons Learned The key to lowering the risk of employees becoming victims of phishing is to adopt an "adult learning" approach to training, says Brent Maher, CISO at Johnson Financial Group

Go-To-Market Strategy in the Clouds

Perficient Data & Analytics

After more than four years as part of the management consulting team, I am now responsible for launching our go-to-market (GTM) strategy for our firm’s cloud services. I’ve embarked on a new journey with Perficient.

9 key rules for transitioning a data and analytics strategy to the cloud

Information Management Resources

Analytics Data strategy Data managementFollowing are the nine key rules to be considered in getting an on-premises data and analytics environment successfully transformed to the cloud.

Save your data strategy from a nosedive

Information Management Resources

In order to compete in the age of the customer, your data strategy must be top-flight. Business intelligence Data management Data strategyThe vast majority of firms come up short in this regard.

42

Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia

Dark Reading

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity

Exploring Cyber's Role in the New National Security Strategy

Data Breach Today

An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system

Lack of cohesive strategy hinder many cloud migration efforts

Information Management Resources

Data strategy Data management Cloud computingA majority of large enterprises are not realizing the full benefits of their cloud migration journeys, says Accenture. The firm identified security and the complexity of business and operational change as barriers.

Cloud 36

OpenText Extends Cloud Strategy with the Release of OpenText OT2

OpenText Information Management

I’m pleased to announce that today’s release of OpenText products, platforms and services further extends our enterprise cloud strategy, completing the need of our customers to access their business-critical information in the most convenient, secure and agile ways possible.

Cloud 65

Three Fundamental Digital Preservation Strategies

IG Guru

The post Three Fundamental Digital Preservation Strategies appeared first on IG Guru.

4 key elements to a successful data governance strategy

Information Management Resources

Data governance Data management Data strategyEnsuring leaders understand they are responsible for their organization’s data and managing that data is not the sole duty of IT staff can lead to a stronger data stewardship program.

Three Strategies for Big Data Security

Thales eSecurity

These are great tactics, but I’d like to discuss the three most common overarching strategies I see in Big Data security today. Strategies for Securing Big Data. The post Three Strategies for Big Data Security appeared first on Data Security Blog | Thales e-Security.

Preparing an Omnichannel Anti-Fraud Strategy

Data Breach Today

Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud

Risk 116

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan. cybersecurity nationalsecuritypolicy

Necurs Botnet adopts a new strategy to evade detection

Security Affairs

The Necurs Botnet continues to evolve, a new strategy aims at hiding in the shadows, and leverages new payloads to recruits new bots. The post Necurs Botnet adopts a new strategy to evade detection appeared first on Security Affairs.

Virus Bulletin 2019: Japanese Attacks Highlight Savvy APT Strategy

Threatpost

Multiyear campaigns stretching back to at least 2014 have been seen using zero-days in region-specific software. Government Hacks Vulnerabilities APT attacks Japan jpcert region specific software virus bulletin 2019 zero day campaigns