Cymatic Lets Companies Track Each Employee’s ‘Security Hygiene’
In March 2019, a breach exposed private data from more than 100 million Capital One customers across the U.S. and Canada. The breach wasn’t detected by the bank until early July. “Most security products even today are geared specifically around static-based vulnerabilities — things that are fixed,” says Jason A. Hollander, a cybersecurity technologist for over 20 years. “There’s firewall ports that are open, and that’s what happened during the Capital One breach.” A lot of a company’s security relies on other individual’s practices, says Hollander. His customers would ask for feedback on how to protect their brand with visitors constantly coming onto their web property and accessing information.
Microsoft’s Kelley: Six principles that influence people to say yes can be leveraged to thwart social engineering
As Malcolm Harkins, chief security and trust officer at Cymatic, says, people are the perimeter. Managers, developers and business leaders so far have not adequately protected the perimeters that are left, Harkins says, noting that hygiene – device, data and credential – has lagged usage models.
The Business Intelligence Group today announced the winners of the 2020 Fortress Cyber Security Awards. The business award program sought to identify and reward the world’s leading companies and products that are working to keep our data and electronic assets safe among a growing threat from hackers.
Mimecast’s latest State of Email Security report shows a rapid increase in phishing, ransomware, and impersonation attacks, with a need for organizations to bolster cyber resilience programs.
Discover the ways Cymatic helps companies keep web applications safe from cyber threats during the COVID-19 pandemic.
Everyone agrees that risk is essential. They just have different versions of what risk is, Evan Schuman reports.
AWhen you think of a security operations center (SOC), whatcomes to mind? Is it an organized team of security analysts andengineers who detect, analyze, and respond to incidents, alwaysworking in lockstep with business managers to execute on thesecurity strategy?