June 28, 2017 | Podcasts | Incident Investigations, Handling and Tracking | By Chris Gonsalves, IANS Director of Technology Research
IANS Faculty Mark Clancy hops on the broadcast this week for a no-nonsense analysis of this week's global Petya-like ransomware attack. Mark brings his decades of experience as a security consultant, enterprise defender and threat intelligence expert to this discussion of the evolution of cyber-weapons, the limitations of real-time incident response and the tough choices teams make to balance protections and productivity.
Seven out of 10 brand impersonations targeting high-profile executives involve spoofing a Microsoft address. File-sharing service Dropbox is a distant second, followed by United Parcel Service (UPS).
Huawei remains the leading global mobile infrastructure provider with 28 percent of the world’s market, compared to Ericsson’s 27 percent. Nokia, China’s ZTE and Samsung round out the top 5.
This template documents a charter and bylaws for a customer-infosec advisory council designed to facilitate the sharing of company infosec capabilities and roadmaps with customers, and customer experiences and concerns with the company.
In this Topic Guide, IANS Faculty turn their attention to the critical information security issues facing enterprises in 2019. From automation, containerization and Office 365 mailbox compromise to privacy and leadership skills, IANS has you covered.
By continuing to use our website, you consent to our
cookie usage and revised Privacy Statement.