The STIR/SHAKEN (S/S) framework allows voice service providers to authenticate that the caller ID information transmitted with a particular call matches the caller’s number. Upon widespread implementation, the hope is that S/S will help reduce illegal spoofing, allow law enforcement to identify bad actors more...
It's boom times for high-growth enterprises. But the same can be said for cybercriminal adversaries looking for cracks in your cybersecurity armor. How can you leverage your security controls and data to build an effective and mature 24/7 threat detection and response capability, that also helps ensure...
Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru’s Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to...
Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru’s Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to...
Ransomware continues to dominate headlines with no sign of slowing down.
What started more than 30 years ago has become one of the most prevalent and lucrative cyberattacks, with 20% of ransomware attacks damaging reputations beyond repair. As this continuously growing problem continues to threaten organizations...
The disruption of the pandemic along with the anywhere workforce resulted in a surge of sophisticated cyberattacks and material breaches. 78% of Canadian cybersecurity professionals said attacks increased due to employees working remotely.
Security teams now face the challenge of securing the anywhere workforce....
The cybersecurity firm IronNet, founded and led by retired Army Gen. Keith Alexander, has gone public without an IPO by merging with LGL Systems Acquisitions Corp., a "blank check" shell company formed to handle such mergers. Meanwhile, Checkpoint has announced plans to acquire the email security firm Avanan.
The healthcare sector has been reshaped by the forces of digital transformation and virtual health. But it also has been besieged by the shifting threat landscape and the escalation of destructive ransomware attacks. What role can zero trust play? Jack Miller of Menlo Security shares insight.
A vulnerability in Microsoft Azure's database service Cosmos DB has potentially put at risk thousands of Azure customers, including many Fortune 500 companies, according to the security firm Wiz. Microsoft has mitigated the flaw.
In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.
Security researchers at AT&T Alien Labs say they've discovered a cluster of Linux ELF executables, identified as modifications of the open-source PRISM backdoor, that attackers have been using in several campaigns for more than three years.
Following the Colonial Pipeline disruption, Censys examined 11 oil and gas companies operating and based in the United States using its Attack Surface Management (ASM) platform. Censys found a total of 682 risks across the 11 companies, which are broken down further by threat type within this report. This report sheds...
Cyber criminals are getting bolder and more sophisticated with their threats. No matter what kind of business you are in, you are likely to run into ransomware threats. During a ransomware attack, organizations - big and small - struggle to maintain productivity, preserve brand reputation and come up with a payment...
Managed security service providers need a vendor-agnostic observability tool that centralizes their customers’ growing amounts of data and continues to prioritize cybersecurity, with a focus on pure threat detection and response. Cribl LogStream is the best way for managed security service providers to implement an...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.