In this single 40 minute session, you will feel informed on the future of apps, clouds and infrastructure monitoring - and ready to tackle them. SREs, DevOps Team Leaders, ITOps Managers, Cloud Architects and anyone who has to modernize their toolsets to deal with the new business reality of “deliver better, deliver...
A Kansas man faces federal charges for allegedly accessing the network of a local water treatment facility and tampering with the systems that control the cleaning and disinfecting procedures, according to the Justice Department. The charges follow a similar security incident at a Florida facility.
As times change, many companies and organizations have worked on ramping up their multi-faceted security defenses. However, threat actors and cyber criminals also adapt and hunt for new vulnerabilities, compromising data by embracing new exploits to ensure substantial financial payoff.
In this report, we...
Threat detection and response is a core component of modern security programs, driving investment in tools to improve visibility, efficacy,
and efficiency. As organizations commit to and extend EDR, NDR, or other security analytics solutions in support of broad threat detection
and response programs, new...
Advanced attackers can evade detection by stealing credentials and masquerading as legitimate users. In response, security teams today must deploy multiple – often siloed – detection and response tools.
The problem is that each tool only provides a narrow view of one data source, forcing analysts to manually...
Security teams face a dizzying array of threats, from ransomware and
cyberespionage to fileless attacks and damaging data breaches. However,
the biggest headache for many security analysts is not the endless number
of risks that dominate news headlines, but rather the repetitive tasks they
must perform every day...
Protecting your endpoints requires a much more holistic approach than simply blocking known
malware. Adversaries today create countless variants of malware and use obfuscation techniques
to evade signature detection.
They can turn your own resources against you, converting legitimate
endpoint applications into...
Aberdeen's analysis of more than 1,000 organizations using mainframes shows that they continue to have a positive, growth-oriented, and strategic position within the enterprise computing infrastructure.
Given their significant value, it comes as no surprise that mainframe security is identified as a top priority -...
U.S. intelligence agency reports conclude that Russia and Iran tried to interfere in the 2020 presidential election via disinformation campaigns, but found "no indication that any foreign actor attempted to alter any technical aspect of the voting process," including voting results.
As the Biden administration makes final preparations to respond to the attacks against SolarWinds, it's been confronted by a second major cyberthreat: the hacking of Microsoft Exchange servers throughout the U.S. The response to this incident, however, will likely be much different.
Ahead of presenting a long-term review of national security strategy in Parliament on Tuesday, U.K. Prime Minister Boris Johnson issued a statement calling for a boost to the country’s capacity to conduct cyberattacks on foreign adversaries.
Although CISA has made significant strides since it was established in 2018, the agency still has important work to do to fulfill its cybersecurity and national security obligations, the GAO finds. This includes better communications with industry partners that share responsibility for critical infrastructure.
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.