Story image

Introducing the dawn of a radical approach to cyber risk management

04 May 2017

When navigating the world of cyber threats, CISOs, CIOs and IT leaders are facing a tough road ahead, but they are not alone.

Risk management leaders are able to find agile defences that quickly adapt to new threats, new demands and to stay ahead of attacks.

According to Cylance®, protection must enable the mission across the entire organisation. The company is part of a radical change to face the modern threat landscape, enabling IT teams to tackle risk management in a better, faster way.

The 9 Box of Control method is a simple and powerful way to look at IT controls. It considers prevention, detection and response and how they work alongside automated, semi-automated and manual systems.

It’s time to think inside the box. Prevention offers the lowest risk, lowest cost and limited liability.

The exclusive white paper, A Radical Approach To Risk Management, presents the risks, the shortcomings of traditional AV industry and why you need to consider security controls. It will explain:

  • The threat landscape and major breaches
  • The 9 box of controls framework and what you should look for
  • The new reality of AI, machine learning and big data
  • How this will increase your organisation's security and strength
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Voter vulnerabilities: Cybersecurity risks impact national elections
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society. 
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."