As threat actors refine their attacks and their automation, prospective victims need to find new ways to scale up their cybersecurity to defend against these threats. Imperva CTO Amichai Shulman discusses how.
From nation-states to organized crime and malicious insiders, organizations are under siege from a variety of adversaries and threats. But how do they focus on the ones that matter most? James Lyne of Sophos offers insight.
Hackers can breach air-gapped voting machines and tallying systems in an attempt to alter ballots to sway the outcome of an election, a Senate panel has learned. Also, at the hearing, DHS discloses that Russian hackers targeted 21 state election systems before the 2016 election.
Concerns over Russian hacking of state election systems are mounting. In New York, Gov. Andrew Cuomo has ordered a review of security efforts related to state elections. On Capitol Hill, Sen. Mark Warner wants DHS to release additional details relating to cyberattacks targeting state election systems.
Cybercriminals and nation-state threat actors are beginning to act alike - and that's bad news for cybersecurity leaders and their enterprises, says Eward Driehuis of SecureLink. Here are the trends to track.
Smart hackers coordinate their attacks across your system. Now you can outsmart the hackers by coordinating your defenses.
Synchronized Security is a best-of-breed security system where products work together and respond automatically to threats.
Download this whitepaper to discover:
The benefits of...
Phishing attacks have seen a meteoric rise in the last year as attackers continue to refine their tactics and share successful attack types. In particular, they've taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks.
The CEO of the company that crippled WannaCry's ransomware component explains to Congress how the worm continues to attack unpatched systems at increasing rates. Also, creating a healthcare cybersecurity framework.
Despite the efficiencies of cloud services, security remains a significant barrier of entry for many organizations. Mark Urban of Symantec offers advice to help security leaders navigate past cloud complexity and chaos.
This monthly Security Agenda will highlight some of the most recent additions to our course library. June's edition features Federal Reserve Bank of Atlanta's Payments Risk Expert, David Lott discussing mobile wallets and emerging fraud. Other industry influencers like US Bank's Mark Gelhardt, Georgia Tech Research...
The Internet of Things (IoT) is transforming our lives and the way we do business. But for the IoT to truly fulfill its promise, it must be secured. IoT devices are notoriously vulnerable, and these vulnerabilities present opportunities for attackers to gain access to your network and install malware, steal...
With the growth in the number and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of the most significant risks that organizations face. Faced with a constant
stream of evolving threats, many businesses spend millions of dollars annually on people, processes, and...
Russian hackers struck election systems in almost twice as many states as previously reported, according to a news report. The breaches could undermine confidence in the election process, one cybersecurity expert warns.
Banks that collectively own SWIFT saw their profits vanish last year as the organization increased its investments in information security, even as the interbank messaging service handled record volumes of money-moving messages.