Attackers do not think of their success as optional. Given that, the effectiveness and success of a threat hunting program are critical. Organizations that start a threat hunting program have success in mind, but are they able to achieve it?
Download this eBook and learn how to:
Think like an attacker;
Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.
Facebook may be facing the fight of its life. The social media company is seeing mounting pressure and a collective outcry over personal data for millions of its users having been collected by a voter-profiling firm once retained by the Trump campaign.
Out-dated AV security, lack of innovation, defeatism, communication breakdowns with IT - little wonder that boards are missing out on the solutions that will protect their organisations from the huge increase in cyber threats.
The devastating consequences of cyber-attacks are now making information security one of...
The FBI has arrested the CEO of the Canadian smartphone service Phantom Secure on charges that he and four other suspects ran an encrypted telecommunications service used by more than 20,000 customers to facilitate illegal activities, including international shipments of cocaine and other drugs.
Leading the latest edition of the ISMG Security Report: The Trump administration sanctions Russian organizations and individuals over U.S. election interference, the NotPetya campaign and energy sector hacks. Also featured: A deep dive into the use of so-called active defense.
While the underlying trends that enabled 2017's ransomware epidemic are continuing to advance, new and evolved threats, trends, and technologies gain speed as well.
Join guest speaker, Joseph Blankenship, Forrester Senior Analyst as we discuss 2018 cybersecurity trends including:
Malware targeting point of sale...
President Donald Trump's nominee to head the National Security Agency and U.S. Cyber Command, Lt. Gen. Paul Nakasone, faces two Senate committee hearings as part of his nomination process. He'll face questions on cyber defense, privacy and combating information warfare.
If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.
To the surprise of many, $120 million allocated by Congress since late 2016 to help the State Department combat foreign governments' U.S.-focused propaganda and disinformation campaigns hasn't been spent. Meanwhile, midterm U.S. elections are fast approaching.
Whoever unleashed malware built to disrupt last month's Winter Olympics in Pyeongchang, South Korea, designed it to look like it had been executed by a group of hackers tied to North Korea. But researchers at the security firm Kaspersky Lab say any such attribution would be false.
Kaspersky Lab says it has uncovered an elegantly written piece of malware that leverages a Latvian-designed router to launch stealthy attacks. The security firm hints that the malicious code could only have come from a well-resourced attacker, but it stops short of naming one.
The increasing number of organizations being hit by crippling mega breaches points to a deficiency in most standard endpoint security solutions. Today's evolving threat landscape requires that organizations not only employ next generation endpoint protection technology, but that they add an element of aggressive...
A zero-day flaw in Adobe Flash, recently patched, has been targeted by a group of attackers that may have ties to North Korea as part of an apparent attempt to hack into Turkish banks, security firm McAfee warns. It notes that there are signs that financial institutions in other countries are also being targeted.