As cyber threats continue to evolve, IT and security managers across North America must stay informed and take proactive measures to keep their organizations secure. Our industry experts have unique insights into these attacks and can provide real-life examples across all industries to help you stay one step ahead of...
The onslaught of distributed denial-of-service, ransomware, data exfiltration and other attacks on the healthcare sector highlight the importance of optimizing the many sources of threat intelligence available today, says Taylor Lehmann, director of the office of the CISO at Google Cloud.
The threat landscape is ever evolving. Modern threat actors constantly develop new tactics, techniques and procedures (TTP) so it's crucial to stay up to date with the latest strategies for protecting your organization.
Security experts from Unit 42™ have unveiled the most commonly observed TTPs in ransomware and...
Approximately 50% of ransomware attacks and breaches fielded by the Unit 42™ Incident Response team result from a common culprit: attack surface exposures.
Ransomware is no longer simply about encrypting files and asking for Bitcoin. New harassment tactics and double and triple extortion make the traditional...
For many organizations, the massive shift to hybrid work brought on many unique challenges for an organization that is migrating to the cloud. There are some questions that have to be considered by that organization when aiming to store their data in the cloud – how is it being protected and who is responsible for...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
The move to cloud email has allowed companies to streamline security investments and leverage the native Microsoft functionality provided by Exchange Online Protection (EOP) and Defender for Office 365 (MDO). But this approach isn’t perfect, and many companies have realized that they need an additional layer of...
Cyberattacks focusing on IoT-connected devices present an additional challenge for critical infrastructure organizations in 2023, due to the large number of vulnerable smart devices that can be compromised remotely.
Explore this research which evaluates the threat landscape from July to December 2022 to report on...
No matter what aspect of cyber security you’re delivering, it takes both time and resources to properly plan, implement, tune, and manage an effective program. The MITRE ATT&CK framework is one of the fastest growing methodologies for structuring a cyber security program.
This white paper discusses the MITRE...
A lack of visibility makes it nearly impossible to protect an organization against attack. If you can't see what's lurking in the dark corners of your environment, all you can do is react instead of actively identifying and mitigating risks. But some technologies can help with threat visibility.
Active Directory is involved in 9 out of 10 cyberattacks. How can organizations best protect their enterprise identity infrastructures? We surveyed IT and security leaders at more than 50 enterprise organizations to determine the most valuable capabilities of today’s identity threat detection and response (ITDR)...
First-party fraud is all about intent and banks have to determine whether the person carrying out the transaction is doing it intentionally. That's hard to do for a basic binary decision model, says Steve Lenderman, senior vice president/director of global loss prevention and fraud, BM Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.