The Australian Cyber Security Centre (ACSC) responded to 2,266 cyber security incidents at a rate of almost six per day from July 2019 to June 2020. These attacks not only disrupt the businesses but translate to costing the economy up to $29 billion per year which is 1.9% of Australia’s gross domestic product (GDP)....
A 30-year-old Greek national has been indicted on charges of selling insider trading tips and other proprietary financial data on darknet sites. Apostolos "The Bull" Trovias faces securities fraud and money laundering charges.
To crack down on insider fraud, organizations should consider using artificial intelligence, machine learning, data analytics, data visualization software, predictive modelling and social network analysis, says Roger Darvall-Stevens, a fraud and forensic services expert at the consultancy RSM Australia.
The Justice Department has filed seven new criminal charges against Paige Thompson, who is suspected of hacking Capital One in 2019, compromising the data of 100 million Americans, including exposing hundreds of thousands of Social Security numbers. If convicted, She now faces a possible 20-year sentence.
A government watchdog is urging NASA to make multiple improvements to its cybersecurity and risk management policies to counter threats to the space agency's network, infrastructure and data. NASA, in turn, is working toward making some security improvements outlined by the GAO by the end of this year.
This edition of the ISMG Security Report features an analysis of CISA's finding that agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by properly configuring firewalls. Also featured: Congressman discusses deterring nation-state attacks; insider threat mitigation tips.
Cybercriminals and nation-states are attempting to recruit insiders at companies around the world to help steal credentials and intellectual property, says Joseph Blankenship, vice president and research director at Forrester, who offers risk mitigation insights.
A bipartisan group of senators is circulating a draft of a federal breach notification bill that would require federal agencies, federal contractors and businesses that have oversight over critical infrastructure to report significant cyberthreats to CISA within 24 hours of discovery.
Securing identities in a “zero trust” environment requires applying multifactor authentication and then adding layers – and artificial intelligence can play a critical role, says Neha Monga, Microsoft’s director of product marketing for cybersecurity and data governance - APAC.
Download this eBook, where...
In a decision that will have major implications for the cybersecurity industry, the U.S. Supreme Court ruled Thursday to limit the scope of the Computer Fraud and Abuse Act. Security researchers and civil liberty groups argued that the 1986 law was too broadly written and outdated for today.
According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
Large enterprises generally have a good grasp on gathering and operationalizing threat intelligence. But when it comes to the midmarket, there are unique challenges. Neal Dennis of Cyware Labs tells how to overcome these obstacles and achieve value from a threat intel platform.
In this video interview with ISMG,...
It's common to say, "The human element is our weakest cybersecurity link." But author and educator James Bone has a different perspective. He weighs in on the human factor and the criticality of modifying enterprise risk management strategies.