Extending Cybersecurity To Fraud Analytics

Information security leaders often defend against cyber threats by focusing on traditional IT tools and techniques — firewalls, intrusion detection and prevention systems, malware detection and analysis and the like. As organizations have locked down systems with more sophisticated defense-in-depth technical controls, adversaries have evolved to take advantage of information systems by impersonating regular users.…

Details

Info-sharing Law Applies to Industry As Well As Government, Agencies Say.

The departments of Homeland Security and Justice say that recent legislation lets businesses share cyber threat information with industry interests as well as government. The agencies released a document Tuesday night clarifying the Cybersecurity Information Sharing Act (CISA). ADVERTISEMENTThe measure, which passed in the 2015 omnibus, was designed to allow companies to share threat information…

Details

Northrop Grumman’s Has a $2 Billion Cybersecurity Business. Here’s What it Looks Like.

Here’s what’s in a portfolio that one company executive said is largely “restricted” and “hard for us to talk in too much detail about.” Northrop Grumman Corp. Chief Financial Officer Ken Bedingfield says a lot of the company’s cybersecurity business is “restricted” and “it’s hard for us to talk in too much detail about it.”…

Details