Ransomware incidents are down, but the volume and impact of targeted attacks are on the rise. These are among the findings of the new Global Threat Landscape Report from Fortinet's FortiGuard Labs. Fortinet's Derek Manky shares analysis of this report and insights on the cybersecurity trends that will influence how we...
The enterprise world is rapidly moving from digital transformation into a new phase of digital expansion that puts unprecedented strain on enterprise risk and security teams.
Adversary numbers are also growing—feeding on the proliferation of enterprise exposures. The World Economic Forum estimates cybercrime will...
A requirements-driven approach to cyber threat intelligence represents a commitment across the intelligence lifecycle to explicitly meet the specified needs of all relevant stakeholders. This paper outlines what it means to be requirements-driven in practice, and offers actionable advice on how Intelligence functions...
Protecting against cyberthreats in this era of remote work is more challenging than ever. Do you know if your organization has all of the capabilities to detect and respond to modern threats?
To help you do a gap analysis, download this checklist of the different areas of threat detection and response – from...
This Case Study talks about DNP is a comprehensive printing company as they enhance risk decisioning as part of its 3DS workflow.
A reliable risk assessment can be given for online payments, regardless of whether this is the first time the card has been used, or when a 3DS security password has not been registered....
Nearly one year ago, Russia invaded Ukraine, and we continue to see cyber operations play a prominent role in the war. To provide more insights into the role of cyber, today, we are releasing our report Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape based on analysis from Google’s Threat...
Cloud-native SIEM dramatically simplifies deployment and management, and increases ease of use, speed, and detection accuracy. As organizations grow, merge, and evolve, cloud-native security solutions can offload the costs of hardware and maintenance from IT teams and simplify operations for security engineers and...
According to this year’s SANS Threat Hunting Survey, threat hunting resourcing is an “ever-growing staffing nightmare.” 73% of this year’s respondents claimed that their biggest challenge is finding skilled staff. This is a 7% increase over 2022, and a whopping 43% increase over 2021.
This talent drought...
It's getting harder to distinguish between normal and unusual threat activity, with more sophisticated attacks exacerbated by hybrid work and, soon, AI attacks. Defenders need correlated rather than isolated telemetry to get more signal and less noise, say Jeetu Patel and Tom Gillis of Cisco.
Mandiant's 14th edition of M-Trends has been released, offering a comprehensive and insightful examination of the constantly evolving cyber threat landscape. Drawing upon Mandiant's extensive experience in incident response investigations and threat intelligence analysis, the report delves into high-impact attacks and...
Cyberattacks focusing on IoT-connected devices present an additional challenge for critical infrastructure organizations in 2023, due to the large number of vulnerable smart devices that can be compromised remotely.
Explore this research which evaluates the threat landscape from July to December 2022 to report on...
A lack of visibility makes it nearly impossible to protect an organization against attack. If you can't see what's lurking in the dark corners of your environment, all you can do is react instead of actively identifying and mitigating risks. But some technologies can help with threat visibility.
According to a recent SANS report, 68% of organizations identify the lack of training and skilled staff as the primary barriers to operating a successful threat-hunting team. This year’s analysis found that 51% of security teams consider their threat-hunting posture as still maturing, acknowledging the need to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.