Cyber-intelligence expert Tom Kellermann sees a growing hostility in cyberspace, and he fears a new wave of advanced threats aimed not just at committing crimes, but at breaching critical infrastructure. Who are the top threat actors, and what are their key targets?
Cybersecurity incidents have evolved considerably since the TJX and Heartland breaches of 2007-08. And so has the discipline of incident response, says former prosecutor Kim Peretti, now a partner at the law firm Alston & Bird. She defines incident response 2.0.
Russian threat intelligence firm Group-IB alleges that North Korea is behind recent attacks against financial institutions in Europe employing fraudulent SWIFT messages. But other experts caution that such conclusions shouldn't be made solely based on technical data.
In this special edition of the ISMG Security Report, you'll hear an edited version of an ISMG Fraud and Breach Prevention Summit keynote panel in which current and former federal cybersecurity officials assess the IT security agenda of the Donald Trump administration.
Did you know that with a combination of multi-dimensional analysis capabilities and advanced analytics, you can transform your defensive cyber strategy into a proactive one?
Download this infographic to counter and mitigate more threats by learning:
How cyber threat hunting works;
The number of cyber attacks an...
British Airways grounded all flights at London's two biggest airports starting Saturday, leading to multiple days of disruptions. The airline has blamed a power surge for its IT failures, but experts have questioned the airline's resiliency and disaster recovery planning and testing.
Restaurant chain Chipotle Mexican Grill says customers' payment card data was stolen via point-of-sale malware installed at the vast majority of its more than 2,000 restaurant locations for more than three weeks.
Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses as well as big data and machine learning combining to secure IT.
The identity of the individual or group behind the global WannaCry ransomware campaign remains unclear. But whoever wrote the ransom notes appears to have been fluent in Chinese and pretty good at written English, according to a linguistic analysis from security firm Flashpoint.
Every day, your employees - usually accidentally - create vulnerabilities that create opportunities for data breaches. You must balance risks with giving employees the access they need to succeed. While cloud apps and BYOD policies are known to increase user productivity & lower operating costs, they are also...
Organizations around the world are being targeted by ransomware attacks like never before...
But rather than suffer a data destruction or business disruption incident, many are paying the ransom. That's no solution. It's costly and comes with no guarantees of the safety of your data or systems. Perhaps worst of all,...
When it comes to breach preparation, it isn't just about protecting IT assets. Increasingly, the conversation is about reputational risk management, says Jacob Olcott of BitSight Technologies.
In an interview about reputational risk management, Olcott discusses:
The intersection of cybersecurity with...
A new phishing site just popped up targeting your online banking customers. Many of your end users who land on the page won't realize they're about to disclose their login or payment card information to fraudsters.
How can you help your customers before they disclose their credentials?
Download this whitepaper...
PSD2 both presents opportunities and introduces new requirements for banks. Proactive, early-adopting organizations will be able to meet the new demands rapidly. By creating new alliances and providing innovative services, they will be able to provide value for both themselves and their customers.