Incident response requires a symbiotic relationship between people, process and technology. Organizations can take several recommended steps to diminish the threat; however, the risk of compromise can never be eliminated. Knowing this, Mandiant recommends that companies focus on improving the cycle time for their incident response process, defining this as a function of the time between initial compromise and threat containment. To this end, metrics play a key role in maturing an organization’s incident response capability.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.