EL AL Israel Airlines Ltd. has over 6,000 employees and is the national air carrier of Israel, carrying over 5.5 million passengers a year. EL AL faces cyberthreats on a regular basis and must maintain the highest levels of application security to prevent these threats from endangering the privacy and safety of its passengers.
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.
It allows them to coordinate all aspects of a response: what's going on in the network, what information is available from threat intelligence feeds, what the regulations are, what the best practices are, and how to ensure that everything is getting done quickly and effectively.
In light of all the headline-grabbing network security breaches in the last year it's understandable that enterprises might be on high alert to prevent their own organization from being thrust into the spotlight.
September 1, 2014
Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.
The tool does not require identifying information, and it does not collect data without opt-in permission.
June 1, 2014
Tool users, including information-security, risk, financial and other senior executives, can input a range of expenses and estimated costs for either a specific scenario or actual breach, and the app, sponsored by Booz Allen Hamilton, would generate a comprehensive report explaining the total cost and enabling a cost-benefit analysis of security strategies.
On January 1, 2014, California implemented an amendment to its breach notification law. The law applies to companies doing business in California that experience a security breach exposing personal information.
This month in Security magazine, we examine how physical security leaders are being propelled into a unique position of revenue preservers and risk managers for their businesses. In addition, we profile Scott Ashworth, Director of Security for Atlanta United. Also, security leaders discuss how to develop cybersecurity careers, election security, data protection strategies, measuring and reporting security operations maturity and more!