PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
May 2020, Vol. 21, No. 2

The state of cybersecurity risk: Detection and mitigation

Attackers lurk in the shadows. Their techniques are constantly evolving, and visibility into threats is limited. In short, information security is not known for clarity. But when it comes to guidance for enterprises seeking to manage cybersecurity risk, it doesn't get any clearer than this: "The ability to quickly detect an intrusion is the foundation of rapid response and remediation," wrote the authors of CrowdStrike's 2020 "CrowdStrike Services Cyber Front Lines Report." Of course, detecting breaches is easier said than done. The average breach goes unseen for more than three months, and that's no accident, according to the CrowdStrike report. "State-sponsored threat actors are applying countermeasures that allow them to remain undetected for a protracted length of time -- particularly in environments protected by legacy security technologies," the report stated. Check out our graphic to learn more about the state of detection and mitigation, including why these steps need to be the cornerstone of any cybersecurity risk ...

Features in this issue

News in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close