3 Ways CISOs Can Boost Their Credibility Within the Enterprise

Security Boulevard Exclusive Series:  What I Learned About Being a CISO After I Stopped Being a CISO In this series we’re talking with former CISOs to collect the lessons they’ve learned about the job after they left—either to work as star… Continue reading 3 Ways CISOs Can Boost Their Credibility Within the Enterprise

How Emerging Technologies Can Unexpectedly Advance — Or Impede — Cybersecurity Gender Inclusion

It’s up to all of us to implement the waves of emerging security technologies and processes in ways that encourage, not impede, greater gender inclusion.

The post How Emerging Technologies Can Unexpectedly Advance — Or Impede — Cybersecurity Gender Inclusion appeared first on Security Intelligence.

Continue reading How Emerging Technologies Can Unexpectedly Advance — Or Impede — Cybersecurity Gender Inclusion

Netkids

Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but if they want their child to spend time online safely and usefully, they must not only understand the basic concepts of digital security and have a grasp of the threats, but also be able to explain them to their kid. Continue reading Netkids

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform. Continue reading A Modern Hypervisor as a Basis for a Sandbox

Accelerate Response With Orchestration

For organizations struggling to keep up with increasingly complex security incidents, orchestration can help streamline response processes.

The post Accelerate Response With Orchestration appeared first on Security Intelligence.

Continue reading Accelerate Response With Orchestration

What Interests Children Online

In order to recognize relevant threats, our products collect anonymous statistics about potentially dangerous content that a child encounters. As part of this report, we analyze the collected data in our quest for the answer to the question of what interests the current generation of children online. Continue reading What Interests Children Online

False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Regretfully, only then does the idea dawn on these developers that high-quality protection from cyberthreats involves not only prevention but also a low false-positive rate. Continue reading False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

The security is still secure

Recently WikiLeaks published a report that, among other things, claims to disclose tools and tactics employed by a state-sponsored organization to break into users’ computers and circumvent installed security solutions. The list of compromised security products includes dozens of vendors and relates to the whole cybersecurity industry. Continue reading The security is still secure