Access "High alert on cyber risk and cybersecurity preparedness"
This article is part of the June 2014 Vol. 16 / No. 5 issue of Threat intelligence and risk: Why cybersecurity hangs in the balance
The call for immediate actions to address cybersecurity is reaching the top levels of global organizations. Cyber risk jumped from 12th to 3rd place in Lloyd's Risk Index 2013, which polled 588 C-level executives and board members at multinationals in April and May of last year. The top five concerns were high taxation, loss of customers, cyber risk, price of material inputs and excessively strict regulation. As discussions about cyber risk heat up boardrooms, are global organizations spending more on cybersecurity? And are they investing in the right security controls? "My CIO asked me that same question last week," said George Do, global information director at Equinix, an International Business Exchange data center and colocation provider, with operations in 15 countries. The problem is no one in information security can really answer these questions. Cyber risk remains a challenging calculation because information sharing about the cost of data breaches is limited, and the InfoSec industry can't agree on how well security controls perform. "We can't ... Access >>>
Premium Content for Free.
Threat intelligence versus risk: How much cybersecurity is enough?
by Kathleen Richards, features editor
Learn how threat intelligence plays into global risk assessment as more security officers are tasked with damage control.
Command-and-control servers: The puppet masters that govern malware
by Adam Rice and James Ringold
Are there shadow networks within your enterprise? Stop malware by shutting down command-and-control communication channels.
- Threat intelligence versus risk: How much cybersecurity is enough? by Kathleen Richards, features editor
Cyberthreat intelligence is getting crowded
by David Strom, Contributor
As threat intelligence communities multiply, it may be time to revisit crowdsourcing security.
Beyond the Page: Global risk assessment
by Kathleen Richards
This Beyond the Page explores the latest advances in threat intelligence and related technology, including threat information sharing services, SIEM and endpoint security products.
- Cyberthreat intelligence is getting crowded by David Strom, Contributor
High alert on cyber risk and cybersecurity preparedness
by Kathleen Richards, features editor
Threat intelligence can shine a light on important security holes.
Avi Rubin on what it takes to move healthcare IT security forward
by Marcus J. Ranum, Contributor
Medical data is the next frontier, Avi Rubin tells Marcus Ranum, as Johns Hopkins University seeks to insulate medical information systems from hackers.
PCI economics: Are the information security requirements working?
by Pete Lindstrom, Contributor
How to evaluate whether PCI DSS is lowering credit card fraud and the risks associated with data breach disclosure.
- High alert on cyber risk and cybersecurity preparedness by Kathleen Richards, features editor
More Premium Content Accessible For Free
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
Figuring out FIDO as the first products emerge
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...