Reddit suffered a data breach in June after attackers managed to bypass its SMS-based two-factor authentication system. User data from 2007 and before was compromised. Security experts say the breach should serve as a reminder that using any two-factor authentication is better than none.
Weapons and attack capabilities that were previously only observed in large-scale nation-state operations are now falling into the hands of the masses. Today's attackers are more sophisticated, and capable of exploiting weaknesses at previously unseen speed and scale.
Download this white paper and learn:
The...
A financial services company with responsibility for protecting sensitive customer data lacked centralized visibility into alerts, had limited expertise to triage, prioritize, and escalate incidents, and spent significant time generating customized financial compliance reports.
After deciding not to build their own...
Even companies in full compliance of industry regulations get exploited. In truth, seeking to become impenetrable is admirable but entirely unrealistic. Now is the time to shift from "check box compliance" to risk-based security defenses that rely on incident response.
Download this brief and learn how to:
Combine...
PCI-DSS mandates all organizations that accept, transmit, process and store cardholder data must continuously monitor and safeguard all sensitive customer information.
Download this brief and learn how to:
Simplify compliance reporting;
Create custom reports to meet your business needs;
Find the right balance...
The FFIEC/NCUA guidance and supervision affects federally supervised financial institutions and their holding companies. However, complying with FFIEC/NCUA guidance can challenge financial institutions that have limited resources.
Download this brief and learn how to:
Simplify FFIEC/NCUA compliance with custom...
Nefarious hackers, cybercriminals and bad actors seek means, pathways and vulnerabilities to gain unauthorized access to a computer device or network for exploitation purposes.
Download this eBook and learn:
How to protect against the top 5 most common attack vectors;
Why you should focus on detection and...
Gartner published their updated Market Guide for Managed Detection and Response (MDR) Services on June 11, 2018. Arctic Wolf Networks has been recognized for three years in a row. And new players have entered into the rapidly growing MDR market.
"By 2020, 15% of organizations will use MDR services, up from fewer...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. Whether it's discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today's attack surface presents a growing challenge to CISOs looking to understand and reduce...
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
With Australia's data breach reporting law now in effect, its healthcare sector has recently reported the highest number of data breaches - a finding that is sure to intensify the already intense scrutiny of the country's controversial e-health records project.
While well known, fewer than 1% of internet users have visited the dark web and even among IT security professionals, only 1 in 7 have ever ventured to a dark web forum or site. This lack of direct experience helps explain why there is so much fear and misinformation being spread. But it also suggests that many in the...
With the cybersecurity threat landscape growing and evolving
rapidly, many enterprises and other large organizations are
seeking more effective ways to protect themselves and their
employees from these threats.
One of the most effective strategies for doing this is to take a more
dynamic and proactive approach to...
Whether you've visited the Dark Web or not, you're likely aware that
it's comprised of various anonymous forums and black markets.
Many of these Dark Web black markets are used for illegal activities,
like buying and selling drugs, weapons, confidential documents
and illegal services. While you may not be in the...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.