The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.
Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.
DMARC enables companies to authenticate legitimate email, publish policies enforceable throughout the ecosystem, and gain intelligence on their email streams.
Download this DMARC fact sheet and learn how these benefits can be measured, resulting in:
326% average ROI;
$1.1m reduction in customer support...
What are the immediate tasks that federal agencies must undertake to comply with the new DHS directive Binding Operational Directive (BOD) 18-01?
Download this whitepaper and learn:
How and when to issue your agency plan of action;
Why there will be complexity with DMARC deployments;
How to get to DMARC reject.
The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.
As the cybersecurity threat landscape evolved over the past two decades, firewalls grew increasingly ineffective at blocking attackers from accessing network data. Next-generation firewalls (NGFWs) aim to fill those gaps, but do they really provide an all-encompassing solution for network security?
The front lines for conflict in the digital age now lay at the network gateway. Unfortunately, on today's virtual battlefield, the enemy is constantly advancing. While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world...
Leading the latest edition of the ISMG Security Report: Why some organizations with working backups still choose to pay a ransom after suffering a cryptolocking malware attack. Also featured: The U.S. government's push to bolster the private sector's "active defenses."
Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older CPUs but also its newest processors - in both client devices and data center servers - to reboot much more frequently than they should.
Government agencies face unique technology challenges in today's world, including complex legacy IT systems, antiquated processes and a prohibitive legislative budgeting cycle. Because of these challenges, many agencies are looking for creative new approaches to overcome the obstacles preventing adoption of the latest...
BlackBerry mobile devices have become a rare sight. But drivers of Audi, GM and Mercedes vehicles may be using the company's embedded operating system in their cars, and with a new tool called Jarvis, BlackBerry is also making a play to secure the code used to drive autonomous vehicles.
As a longtime investor in companies offering cybersecurity solutions, Alberto Yépez of Trident Capital Cybersecurity is most concerned by a lack of investment in one key area; replacing aged technologies that are supporting critical infrastructure industries, such as power utilities.
The CIA has attributed last year's outbreak of NotPetya wiper malware to Russia's GRU military intelligence unit, The Washington Post reports. Other intelligence agencies and information security experts have reached similar conclusions, warning that Russia's hybrid warfare campaigns are intensifying.
We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.
This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.