Why a Cyber Risk Assessment Is Essential for M&A Due Diligence

According to J.P. Morgan, the global mergers and acquisitions (M&A) market amounted to $5 trillion in 2015 and continues to show strong levels of growth. When it comes to M&A, the due diligence process involves investigating the health of another business before engaging in any sort of transaction. This process will take many factors into account,…

How to Speed Up Incident Response

Having an incident response plan in place is key if you want the ability to speed up your company’s reaction to security incidents. However, a recent survey by the Security for Business Innovation Council (SBIC) found that just 30 percent of large organizations have an incident response plan, and of those that do, 57 percent…

Two-Factor Authentication Is a Must for Mobile

For the past few decades, two-factor authentication has been used by businesses to enforce entitlements to access sensitive corporate applications and data. It provides an extra layer of security beyond username-and-password authentication mechanisms, which are notoriously insecure and burdensome for users to remember. Now, as the use of mobile devices in the workplace increases, this…

How to Tailor a Continuous Monitoring Policy to Focus on Critical Assets

Many organizations want to implement a continuous monitoring policy, which combines processes and technology to ensure security systems are working efficiently and effectively. Continuous monitoring enables IT teams to identify issues that could introduce risk or lead to compliance violations. As such, a continuous monitoring policy not only makes good business sense but is increasingly…

How Breach Readiness Is Enhanced by Threat Intelligence

Breach readiness is essential to limiting the impact of data breaches, regardless of industry or company size. Recent RSA research determined the current state of breach readiness and response at large organizations. The four critical areas considered in the survey were threat intelligence, content intelligence, analytic intelligence, and incident response. Organizations Are Moving Toward Proactive…

The Essential Role of Forensics in Computer Security

Every organization, no matter its size or line of business, should assume it has either been or will be breached. When it comes to responding to an incident, organizations need to realize that time is of the essence. For this reason, forensics in computer security is a growing discipline. However, according to a survey by…

Biometric Security: Making Authentication More Secure and Convenient

Concerns about biometric security, its usability, and the potential for spoofing are starting to dissapate. Fingerprint sensors are now being built into the latest smartphone models, which means more people are becoming comfortable with the technology. Although some users still cite concerns with biometric security, convenience is the main driver for its increased adoption. Biometrics…

The Importance of Context in an Incident Response Plan

Effective incident response is essential to minimizing the impact of a security incident and allowing the organization to return to normal operations as soon as possible. To this end, an incident response plan will ensure actions can be taken in a coordinated, controlled manner. However, a one-size-fits-all incident response plan is unlikely to be effective.…

Biometrics: A Next-Generation Authentication Mechanism

The days of username and password combinations are coming to an end as next-generation authentication mechanisms come of age. Faced with having to remember old-style credentials for an ever-wider range of applications, most users have resorted to insecure password management practices such as writing down credentials. This is especially the case when using complex passwords…

How to Improve the Effectiveness of Incident Response

According to the SANS Institute, although 21 percent of respondents to a recent survey were unable to determine whether they had suffered a security incident in the past two years, 61 percent could confirm they had been a victim of a breach, unauthorized access, denial-of-service attack, or malware infection. Efficient incident response is vital when…