A lot of security processes failed during the <a href="http://www.computerworld.com/article/2486959/cybercrime-hacking/target-says-hackers-likely-accessed-40-million-cards.html">breach of Target's systems</a> during last year's holiday season, but one surprising revelation was that the <a href="http://www.computerworld.com/article/2488641/malware-vulnerabilities/major-companies--like-target--often-fail-to-act-on-malware-alerts.html">retailer actually did receive</a> security alerts about the malware in its system. Yet because the security team was bombarded with alerts -- estimated at hundreds per day -- it couldn't adequately prioritize them.
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Caution: That SSL Blind Spot is Growing
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Ransomware explosion is the latest security wakeup call for CxOs
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- New Destination Gigamon Security Resources IS HERE
- The Future is Encrypted. Manage It.
- Hear from International Tom Corn on the future of security virtualisation | 28th July 2016 Victoria