Benchmarking Future Growth Potential
Within a field of eight competitors, Anomali was positioned on the Frost Radar as the clear innovation leader and ranked second in the growth index. Frost & Sullivan profiled companies that demonstrate a commitment to improving their products and growing their market share.
...
Coronavirus Is Shaping How Organizations Approach Cyber Threat Intelligence
This year’s SANS Cyber Threat Intelligence (CTI) Survey analyzes the latest trends in CTI and guides how organizations are expanding their use of CTI. The current environment brings a unique perspective, given the global changes and...
The Forrester Tech Tide is a report that examines the maturity of an ecosystem of technologies and helps organizations decide which technologies to invest in and when. A Forrester Tech Tide classifies software or hardware based on maturity and business value into one of the following categories: experiment, invest,...
Threat intelligence researchers are looking closely at REvil, the ransomware gang that infected up to 1,500 companies in a single swoop. A look at the group's online infrastructure shows clear lines to Russian and U.K. service providers that, in theory, could help law enforcement agencies but don't appear eager to...
To understand the global impact of COVID-19 on the security posture of organizations, the Unit 42 cloud threat intelligence team analyzed data from hundreds of cloud accounts around the world between October 2019 and February 2021 (before and after the onset of the pandemic).
This report details the scope of...
Microsoft announced Monday a definitive agreement to buy RiskIQ, an attack surface management and threat intelligence firm. Last month, Microsoft acquired the firmware analysis company ReFirm Labs.
Based on Forrester Consulting’s new 2020 State of SOAR Report, 93% of SecOps teams say they’ll be making a priority of increasing automation in their incident response processes in the coming years.
Attacks are definitely on the rise. In fact, 79% of the businesses surveyed had experienced a breach in the past...
Need to get up to speed on the XDR category and what it means for your company? As a modern approach to threat detection and response, Extended Detection and Response (XDR) progresses beyond traditional EDR with a scalable cloud architecture that natively integrates endpoint, network, and cloud data to stop...
As ransomware attacks become more prolific, their success is being driven by the increasing use of specialists who can refine every stage of an attack. It's a reminder that the goal of cybercrime remains to maximize illicit profits as easily and quickly as possible.
It was stealthy, and it was widespread. But perhaps the Kaseya VSA ransomware attack wasn't quite as effective and damaging as initially feared, says Michael Daniel, president and CEO of the Cyber Threat Alliance. He explains where defenses succeeded.
REvil, aka Sodinokibi, is one of today's most notorious - and profitable - ransomware operations, driven by highly skilled affiliates who share profits with the operators. And the operators are constantly improving the malware, including porting it to Linux to target network-attached storage and hypervisors.
The NSA, the FBI and other U.S. government agencies are tracking an ongoing Russian cyberespionage campaign in which attackers are using brute-force methods to access Office 365 and other cloud-based services.
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Deputy national security adviser Anne Neuberger says the White House is preparing to release additional details, including attribution, about the attacks that targeted vulnerable on-premises Microsoft Exchange email servers at government agencies and other organizations earlier this year.
The legitimate security penetration testing tool Cobalt Strike is increasingly being used by threat groups, especially those that are less technically proficient, according to a Proofpoint report. The security firm says the number of attacks using the tool rose by 161% from 2019 to 2020.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.