Given the stealth of today's advanced attack malware, the scale of data compromise and speed of execution, it has been proven time
and again that relying on a passive, defensive security strategy is no longer adequate. Advanced attacks are designed to be stealthy and obfuscate their tracks. In many cases, alerts are...
Retail organizations have always been tempting targets to cyber criminals looking for payment card and personally identifiable information. Protection today requires a complete picture of the network not just PoS systems. This includes all available contextual data, your unique network configuration and behavior as...
The news is inundated with reports of businesses being compromised by various types of security attacks. These organizations are often judged for their perceived lack of preparation, their disclosure of the breach and, perhaps most importantly, their response. A comprehensive detailed view of network activity both...
In an environment of constant attacks, network packet capture and advanced security analytics are needed to discover the attack in
progress and provide the intelligence to minimize the damage done. Advance knowledge of the reconnaissance phase, early probes of vulnerable systems, suspicious lateral movement, and...
IR teams, typically operating under a formalized IR plan, are designed to detect, investigate and, when necessary, remediate organizational assets in the event of a critical incident. SANS conducted a survey with the goal being to get a clearer picture of what IR teams are up against today. Such as, the types of...
The retail industry is booming. What's more, retailers are investing in e-commerce strategies and user-friendly websites to further
entice consumers and to stay competitive. They're also upgrading point-of-sale (POS) systems to improve control and introducing
contactless payment to speed up the purchasing process. ...
In 2011, the Federal Financial Institutions Examination Council (FFIEC) issued a supplement to the Authentication in an Internet Banking Environment guidance, issued in October 2015. The purpose of the supplement is to reinforce the risk-management framework described in the original guidance and update the FFIEC...
British police have arrested a third suspect in connection with the hack attack against telecommunications provider TalkTalk. Separately, Vodafone UK also issued an alert of a breach, which it traced to reused passwords.
How prepared is your health care organization to respond to an attack, and what resources - in-house and outsourced - are used to defend valuable protected health information?
Register for this informative webinar to learn how health care organizations are combating data breaches.
Today, the chances of being the victim of a targeted data breach are greater than ever. The fact is it's no longer if you'll be hacked but when. Businesses need to do everything they can to stop a breach, but equally important is how they react when it does.
While sophisticated cyberattacks and high-profile mega-breaches get most of the attention, European fraud experts say less sophisticated attacks are far more common and pose a greater fraud risk. At ISMG's Fraud Summit in London, they called for global collaboration to fight fraud.
British police have arrested a 15-year-old boy in connection with the suspected hack of TalkTalk. Security experts say that if a teenager was responsible, it's going to be difficult for the communications firm to prove that it takes customers' data security seriously.
A recently discovered hacking incident affecting more than 11,000 mental health patients in Texas is a reminder of the privacy risks cyberattacks pose to individuals' most sensitive data.
How well prepared are organizations to respond to a potentially devastating data breach - such as the likes that hit Anthem, OPM or even Ashley Madison? Are their security programs and controls truly as effective as security leaders believe them to be? These are among the questions answered by the results of the 2015...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your response team fail is to have them untrained on rarely practiced procedures while being overly reliant upon expensive, improperly configured technology. It is proven that humans...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.