Security leaders shouldn't ignore current geopolitical tensions, which are going to infiltrate into private sectors, says Troy Leach of the Cloud Security Alliance. And John Kindervag of ON2IT Cybersecurity says - for that reason - organizations need to stop being cheap on cybersecurity.
The persistence, sophistication, and disruptiveness of cyber-attacks have spurred security leaders into action. Moving from reactive to proactive, they’re now operating on Zero Trust and Microsegmentation models.
With a governing philosophy of “never trust, always verify” and “always assume a breach,”...
Three in four organizations experienced a malware attack last year, according to Comparitech. With malware attacks increasing year over year, it is imperative to arm your network with proactive solutions coinciding with reactive solutions. Take the first steps to protect your IT environment by equipping yourself with...
According to Gartner, continued increases in the volume and success of phishing attacks and migration to cloud email require a reevaluation of email security controls and processes.
Download the 2021 Gartner Market Guide for Email Security to learn:
What integrated cloud email security (ICES) solutions are and...
While ransomware, third-party risk, phishing scams and insiders continue as the top threats facing healthcare and public health entities, the sector overall is becoming better prepared to deal with these issues than it was just a few years ago, says Denise Anderson, president and CEO of H-ISAC.
In 2021, it was reported that over 67,500 cybercrimes occurred in Australia, which is an increase of 13% compared to the previous year. This reiterates that despite implementing strong policies and controls, due diligence is needed to help thwart cybercriminals who continue attempting advanced and sophisticated...
The Cuba ransomware group, which has previously targeted U.S. critical infrastructure firms, has updated its malware to "optimize" execution and "minimize" unintended system behavior, says Trend Micro. Researchers at Elastic Security Labs also share malware analysis, TTPs and detection techniques.
Once ransomware is invoked within an organization, most variants utilize privileged accounts and trust relationships between systems for lateral dispersion.
Download this report and learn:
Practical endpoint security controls and enforcement measures;
How ransomware is commonly deployed across an environment...
This report provides proactive recommendations for organizations to prioritize for protecting against a destructive attack within an environment.
Download the report and learn practical and scalable methods which can:
Help protect organizations from destructive attacks;
Remediate incidents where a threat...
With Mandiant you can address the challenge of ransomware and mitigate or significantly minimize the overall impact of this attack type.
Download this brief and learn how to:
Identify the critical assets that attacks can reach in your environment;
Uncover technical and operational weaknesses;
Make both...
Greg Murphy, CEO of Ordr, says there are three topics healthcare senior leaders and board members keep asking about: ransomware, ransomware … and ransomware. He discusses how healthcare entities are addressing their biggest threats, IoT devices, and the implications of the PATCH Act.
As the dwell time between when hackers compromise a system and when they trigger a ransomware attack has grown, victims have a little more precious time to detect and stop these attacks "before the worst happens," says Chet Wisniewski, principal research scientist at Sophos.
The U.S. is on "borrowed time" for a major cyberattack that could potentially seriously disrupt critical infrastructure, but the nation can secure its systems and resources to avoid such cybersecurity disasters, says Rep. Eric Swalwell, D-California.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
The new Expel Quarterly Threat Report provides even more data on what we’re seeing, detection opportunities, and resilience recs to help protect your organization — now on a quarterly basis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.