Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments. How can deception technology offer a new alternative?
The key to deception technology is to deter lateral movement inside a network. On each...
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks.
Download this report, where we surveyed businesses across all industries to find...
As account opening continues to transition from physical to digital channels, financial institutions and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise thanks to some of the same digital channel benefits enjoyed by consumers:...
A class action lawsuit is seeking millions of dollars in damages for plaintiffs after yet another mailing-related health data breach involving sensitive HIV-related information allegedly visible through envelope windows.
The notorious "lone hacker" known as "Guccifer 2.0," who claimed credit for breaching the Democratic National Committee and dumping stolen emails, failed to activate a VPN client at least once, revealing an IP address at the headquarters of Russia's GRU military intelligence agency, the Daily Beast reports.
The U.S. Department of Justice has announced the indictment of nine Iranians alleged to have penetrated systems belonging to hundreds of U.S. and foreign universities, government entities and private companies to steal more than 31 terabytes of documents and data.
As the Cambridge Analytica scandal continues to unfold, Congress seeks answers from Facebook, calling on CEO Mark Zuckerberg to testify. Also in the latest edition of the ISMG Security Report: Is it possible to build a secure digital wallet for storing cryptocurrency?
A group of suspected Chinese cyber espionage actors, dubbed TEMP.Periscope or Leviathan, has re-emerged, targeting the maritime industry as well as others, according to a report from FireEye. Many of those targeted have connections to the South China Sea.
Recent financial reports from three healthcare sector organizations that suffered cyberattacks demonstrate how costly data breaches can be for not-for-profit healthcare providers and for-profit companies alike.
States will not have the full range of much-needed cybersecurity practices and equipment in place for this year's U.S. midterm elections. But efforts underway might deliver many much-needed improvements in time for the 2020 elections, Homeland Security Secretary Kirstjen Nielsen tells a Senate committee.
Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.
The need to strengthen enterprise authentication is almost
universally acknowledged. Security professionals are quick to
look at two-factor and multifactor solutions to accomplish the
goal. Clearly, the addition of second and third factors addresses
the need. However, in the process, security professionals...
Attackers do not think of their success as optional. Given that, the effectiveness and success of a threat hunting program are critical. Organizations that start a threat hunting program have success in mind, but are they able to achieve it?
Download this eBook and learn how to:
Think like an attacker;
Identify...
Despite the known risks, passwords remain the most common method of user authentication. The increased number of apps employees need for their jobs, coupled with the effort required to migrate to new authentication technologies, means that pros need to plan for password coexistence. EPMs help manage passwords until...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.