PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Plan now for the future of network security
This article is part of the Information Security issue of May 2020, Vol. 21, No. 2
Companies are still adjusting to the new normal of network security, figuring out how to protect information with at least a percentage of their workforce conducting business remotely. But even before the COVID-19 pandemic further complicated network cybersecurity, systems and data were under pressure from a new class of threats much more complicated than typical phishing expeditions. Hackers today use advanced techniques such as "island hopping" to attack enterprises via their more vulnerable business partners or tap into deepfake technology to fool user authentication mechanisms. Even nation-state hackers have moved beyond targeting huge corporations that operate industrial control systems. Information available on small companies' networks might provide insight into the operations at their larger business associates, for example, or about any dealings they have with the federal government. The deep pockets and expansive resources at nation-state hackers' disposal make it difficult to protect against these types of attacks, ...
Features in this issue
-
AI-powered cyberattacks force change to network security
Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data.
-
The state of cybersecurity risk: Detection and mitigation
Hackers will always try to creep in, and many will succeed. That's why effective detection and mitigation are essential. How are enterprises faring?
News in this issue
-
Plan now for the future of network security
How to battle well-funded, technologically sophisticated threats and ensure high-quality network performance? CISOs need a plan to meet network challenges now and in the future.
Columns in this issue
-
One security framework may be key to cyber effectiveness
The Mitre ATT&CK security framework could best enable effective cybersecurity, according to The Chertoff Group, as could joining information sharing and analysis organizations.
-
Why nation-state cyberattacks must be top of mind for CISOs
Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Here's why.