2016 was a year where more was more in the security world. The implications of the unprecedented leaks of comprehensive data sets, from political to intellectual property concerns, will have major impacts on the security landscape for years to come.
Download this whitepaper and learn:
Why classic attack vectors...
Are unpatched vulnerabilities leaving you at risk?
At the rate of almost half of all attack types, hackers are using injection attacks to take advantage of vulnerabilities in operating systems and applications to penetrate networks and databases.
Download this whitepaper and learn:
How attackers are using...
With both money and personal information at stake, financial services organizations continue to be a magnet for cybercrime.
Download this whitepaper and learn about:
Notable attacks against financial institutions in 2016;
Prevalent methods of attack utulized by cybercriminals;
Best practices for banks to...
If procurement requirements are not established and met before purchase, implementing a next-generation antivirus (NGAV) solution can be a costly undertaking. Investing time and brainpower in a disciplined procurement process helps your organization make the most informed decision regarding the solution. Doing this...
An international police operation has resulted in the disruption of the long-running Andromeda botnet and associated Gamarue crimeware toolkit. Andromeda has been used to distribute 80 types of malware, including backdoors, banking Trojans and ransomware, security experts say.
The U.K.'s privacy watchdog has launched a probe after some Members of Parliament admitted they share email passwords or leave workstations unlocked. The MPs were attempting to defend a colleague who's been accused of downloading and viewing pornography on his work PC.
Email, which is too easily spoofed, phished or taken over, remains a leading cybersecurity risk. But finally, after years of pushing, the Domain-based Message Authentication, Reporting and Conformance standard, or DMARC is helping to bolster email security, says Phil Reitinger, CEO of the Global Cyber Alliance.
Denial of Service, web application layer attacks, credential abuse and IoT - these are the attack trends and vectors that will make headlines in 2018. Ryan Barnett of Akamai offers insight into how to prepare your defenses.
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
As data breaches increase in scale and frequency, businesses must ensure an effective, swift and well-orchestrated response. To help them, ISMG on Wednesday and Thursday will host a Fraud and Breach Prevention Summit in Mumbai offering insights from 20 leading CISOs and many other experts.
For hackers, phishing is easy. And profitable. The average phishing attack costs a mid-sized company $1.6 million. No wonder the number of phishing attacks shot up 65% worldwide last year.
For many years, organizations have invested in technology to keep them safe from malicious emails. Yet ransomware, CEO...
The New York state Department of Financial Services' cybersecurity regulation - 23 NYCRR Part 500 - has been in effect for nearly a year now, and covered entities face some significant compliance milestones in 2018. This regulation puts new demands on financial institutions for security leadership, breach...
New research shows that the automation of five key security controls is lacking at a majority of organizations, says Ted Gary of Tenable.
A key reason why: the lack of skilled cybersecurity professionals.
Improving network security requires understanding your environment and controlling it before implementing network segmentation, says Nathaniel Gleicher of Illumio, who explains lessons that can be learned from the Secret Service's approach.