Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be that attackers and their dirty work have virtually no time at all. But in reality, many organizations give attackers all...
The Cyberthreat Defense Report began the process of looking beyond headline-grabbing breaches and the nth stage in the evolution of cyberthreats to better understand the perceptions, concerns, and priorities of the IT security professionals charged with defending today's networks. Representative findings from that...
Security intelligence, built upon the same concepts that have made business intelligence an essential enterprise technology, is the critical next step for organizations that recognize the importance of information security to their business health. This is especially critical on today's smarter planet, where...
Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques, increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend...
While technology innovations are improving our everyday lives, cybercrime is also on the rise - and the costs are higher than ever. A recent study found that the annual costs of cybercrime averaged USD11.6 million per large organization in 2013, which is an increase of 26 percent from the previous year.1 In fact, even...
When it comes to healthcare information, privacy is top of mind. A USB drive goes missing and thousands of patient names, diagnosis codes, insurance claims and Social Security numbers run the risk of exposure. The security configuration of a server is mistakenly changed and doctors' reports become accessible over the...
Detecting advanced cyber threats, exceeding compliance mandates and preventing insider data loss are top priorities for governmental organizations. And adhering to the continuous monitoring guidelines mandated by governmental actions like FISMA can consume thousands of staff hours per year submitting monthly,...
Efforts by some Democratic members of a House subcommittee to amend a national data breach notification bill so that states could retain tougher data security requirements have failed. The measure now advances to a full committee.
Three state insurance commissioners are launching a joint investigation into the cyber-attack against Premera Blue Cross, which exposed personal data of 11 million individuals nationwide. Find out what will be examined.
A former systems administrator at a Romanian financial services institution has been extradited to the U.S. and charged with orchestrating an international hacking scheme that included attacks on medical offices, retailers and security firms.
Despite high-profile attacks and publicity, advanced persistent threats continue to strike organizations in all sectors. How can security leaders improve defenses? ThreatTrack's Usman Choudhary offers advice.
Community banking institutions are at great risk of cyber-attack because they often don't think they're targeted, says Scott McGillivray of Pacific Continental Bank, who describes how to convey this risk to senior management.
Target Corp.'s pending settlement of a consumer class action lawsuit is more about public relations than compensating victims, some observers say. But will it have an impact on a pending suit filed by banks?
You understand the intricacies of today's threat landscape, and the difficulties your organization faces when attempting to prevent, investigate and remediate targeted attacks, but how do you explain that difficulty, and subsequent cost, to senior leadership? Often the best tactic is to speak to them in a language...
Despite high-profile attacks and publicity, advanced persistent threats continue to strike organizations in all sectors. How can security leaders improve defenses? ThreatTrack's Usman Choudhary offers advice.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.