Remote work presents many opportunities for businesses, but also has its challenges: How do you maintain security
throughout the business? How do you ensure employees have access to the resources they need to stay productive? Remote work doesn't need to be a challenge with the right password security in place.
...
Yes, you know they are coming. And yes, the fraudsters have raised their game. But that doesn't mean you can't stop socially engineered attacks before threat actors can pull off their scams. Mike Britton of Abnormal Security tells you how.
In this exclusive interview with Information Security Media Group, Mike...
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
Picking up where they left during the 2020 COVID-19 pandemic, bad actors have continued their onslaught of DDoS attacks during the 1st half of 2021. In this webinar join ISMG and NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) to review key findings from their latest Threat Intelligence Report...
CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great
job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad
actors. Cyberedge's mission is to provide deep insight into the...
According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
The FBI and White House confirmed Monday that the DarkSide ransomware variant was used in the Friday attack that caused disruptions at Colonial Pipeline Co., which operates a pipeline that supplies fuel throughout the eastern U.S. But the gang behind the ransomware tried to shift the blame to an affiliate.
Phishing, online fraud, cryptocurrency scams – they are coming at lightning speed, threatening enterprises and their brands. And just as fraudsters rely on automation to deliver these attacks, defenders can use automated tools to protect their brands. Jeff Baher of Bolster tells how.
After the 2008 financial crisis, reform was developed to strengthen the financial resilience of the financial sector but broadly omitted cyber threats and risks.
Yet cyber threats pose a significant challenge to the operational resilience, performance and stability of the financial sector.
Join this session and...
As times change, many companies and organizations have worked on ramping up their multi-faceted security defenses. However, threat actors and cyber criminals also adapt and hunt for new vulnerabilities, compromising data by embracing new exploits to ensure substantial financial payoff.
In this report, we...
The changing threat landscape and the frequency, sophistication and targeted nature of adversaries require an evolution of security operational practices with a combination of prevention, detection and response of cyber attacks.
This report from Watchguard helps security teams understand the well-known cyber-attack...
Email remains the most common channel for opportunistic and targeted cyber attacks—and a major source of data loss. As organizations like yours migrate to the cloud and quickly shift to a remote-work model, they must prepare for new classes of advanced email threats and attack vectors.
It's not always clear how...
At the heart of every cyberattack is an element of social engineering. From more common attacks, such as phishing, to more sophisticated attacks, such as authorized push payments and voice scams, cybercriminals have impersonation of our most-trusted institutions down to a science. This e-book explores how behavioral...
The cryptocurrency company Tether has refused to pay a ransom of 500 bitcoins ($24 million) after hackers threatened to leak sensitive data if the company failed to pay.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ca-security.inforisktoday.com, you agree to our use of cookies.