Security teams face a dizzying array of threats, from ransomware and
cyberespionage to fileless attacks and damaging data breaches. However,
the biggest headache for many security analysts is not the endless number
of risks that dominate news headlines, but rather the repetitive tasks they
must perform every day...
Protecting your endpoints requires a much more holistic approach than simply blocking known
malware. Adversaries today create countless variants of malware and use obfuscation techniques
to evade signature detection.
They can turn your own resources against you, converting legitimate
endpoint applications into...
Aberdeen's analysis of more than 1,000 organizations using mainframes shows that they continue to have a positive, growth-oriented, and strategic position within the enterprise computing infrastructure.
Given their significant value, it comes as no surprise that mainframe security is identified as a top priority -...
U.S. intelligence agency reports conclude that Russia and Iran tried to interfere in the 2020 presidential election via disinformation campaigns, but found "no indication that any foreign actor attempted to alter any technical aspect of the voting process," including voting results.
Hacking incidents - including ransomware attacks, phishing scams and episodes involving vendors - are still the dominant culprits in major health data breaches being reported to federal regulators so far this year. Why?
As the Biden administration makes final preparations to respond to the attacks against SolarWinds, it's been confronted by a second major cyberthreat: the hacking of Microsoft Exchange servers throughout the U.S. The response to this incident, however, will likely be much different.
Ahead of presenting a long-term review of national security strategy in Parliament on Tuesday, U.K. Prime Minister Boris Johnson issued a statement calling for a boost to the country’s capacity to conduct cyberattacks on foreign adversaries.
Although CISA has made significant strides since it was established in 2018, the agency still has important work to do to fulfill its cybersecurity and national security obligations, the GAO finds. This includes better communications with industry partners that share responsibility for critical infrastructure.
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.
The Ponemon Institute found that today 75 percent of all organizations in the United States are not prepared to respond to an attack. Is yours among them? Maybe.
By leveraging a highly effective combination of human and machine power, SOAR stacks can improve the efficiency of your incident response activities,...
While the Capital One breach may have been
jawdropping in its sheer scale, there are best
practice lessons to be learned in its remediation
What was overlooked in the Capital One
data breach, and why it could have been
How to monitor for security events in a
A centralized log strategy has become an essential component in the administration of today’s complex IT environments.
Since log management data is central to the analysis of securing IT enterprise services, understanding operational
performance of IT infrastructure and applications, and key to meeting data...
Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds last December. These second-stage malware variants appear to have been deployed after organizations downloaded the "Sunburst" backdoor hidden in a software update.