Many organizations have invested in improving their threat detection capabilities over the
past two years and express increased confidence in their ability to stop threats that have
penetrated the network perimeter. However, these organizations also cite a number of
weaknesses and areas for further improvement,...
Security practitioners often tread a fine and not entirely well-defined legal line in collecting current and meaningful research. This research can also pose ethical questions when commercial sources for stolen data fall into a gray area.
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
As ‘Threat hunting’ has become something of a buzzword in the cyber security industry, the term is often misused.
Proactive threat hunting is very different from manually sifting through raw data to find an attacker, and threat hunting as a service should complement detection & response operations rather than...
The Cybersecurity and Infrastructure Security Agency will soon use its new subpoena powers authorized under the 2021 National Defense Authorization Act to help in the battle against ransomware attacks and other cyberthreats, says Brandon Wales, the acting agency director.
Swiss cybersecurity firm Prodaft says it has accessed several servers used by an advanced persistent threat group tied to the SolarWinds supply chain attack. These attackers continue to target large corporations and public institutions worldwide, with a focus on the U.S. and the European Union, the researchers say.
Large enterprises generally have a good grasp on gathering and operationalizing threat intelligence. But when it comes to the midmarket, there are unique challenges. Neal Dennis of Cyware Labs tells how to overcome these obstacles and achieve value from a threat intel platform.
He started his cybersecurity career as a pen tester. As a result, Gong CISO Jack Leidecker retains an affinity for the tech community and emerging tools. He shares insight on this passion and his drive to ensure security’s role in business enablement.
Serious vulnerabilities in Microsoft Exchange have been exploited by at least 10 APT groups that have been collectively been hitting thousands of companies over the last three months, including prior to when Microsoft was first alerted to the flaws and issued a patch, security researchers warn.
Legacy tools and applications often prevent enterprises from adopting monitoring approach, says Ranndeep Chonker, manager security & risk practice, Asia & India at ServiceNow.
In this Total Economic Impact™ (TEI) study of ManagedXDR, Forrester Consulting assesses the cost savings, productivity gains, and business benefits Secureworks users experience.
The study found a potential ROI of 413 percent* over three years for ManagedXDR customers, as well as other quantified and...
Extended detection and response (XDR) has been gaining momentum in the security arena. Has your organization considered the potential impact of XDR on your security operations? In a recent study, ESG surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR,...
It used to be enough to protect the network perimeter, but in recent years, an expanding perimeter has opened the door to threat actors preying on a larger attack surface.
Understanding the evolution of endpoint security and the solutions available to your organization is key to protecting your business in...
Threat intelligence can be a useful addition to your security toolkit. It
can provide your analysts with information and context they would
not have otherwise. There are many factors to consider, including
where to obtain the intelligence, how to collect it, how to integrate it,
and how much to...
State-sponsored groups in China appear to be targeting India’s power supply by dropping malware into systems, according to online digital threat analysis company Recorded Future. The Indian government says it has taken steps to mitigate the risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.