Ransomware attacks pose the biggest cybersecurity threat to U.K. organizations, particularly hospitals and schools, the country’s National Cyber Security Centre warns. So far in 2022, 18 ransomware attacks have required nation-level coordinated efforts to mitigate the threats, it adds.
Artificial intelligence-driven technology purporting to recognize human emotional states "may not work yet, or indeed ever," said U.K. Deputy Information Commissioner Stephen Bonner. The office predicts greater commercial use of behavioral analysis in products over the next two to three years.
The U.K. Information Commissioner levied a nearly $5 million fine against Interserve Group Limited for its lack of security protections in the run-up to a 2020 ransomware attack. The firm kept employee data on servers running obsolete versions of Windows and used outdated antivirus software.
The Cl0p ransomware group has been attempting to extort Thames Water, a public utility in England. Just one problem: the group attacked an entirely different water provider. Through ineptitude or outright lying, this isn't the first time that a ransomware group has claimed the wrong victim.
This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.
Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
Organizations that are relying on cloud-based email providers to secure their email systems and data should strongly consider adding a secure email gateway. Too many organizations are confusing the existence of security features with the efficacy of those features.
While moving enterprise email to the cloud has...
Email continues to be the No. 1 source of cyberattacks and a significant point of risk for most organizations. Yet other
collaboration tools (e.g. Slack, Microsoft Teams, and even Zoom) are also emerging as points of risk.
An open and pervasive security integration strategy is required to reduce the burden on IT...
The UK Cyber Security Council is responsible for running the cybersecurity industry’s Cyber Certified Professional scheme. The council seeks to set the standard for chartered cybersecurity professionals and align with qualifications and certifications in the sector, says council CEO Simon Hepburn.
Email is the number one attack vector, making email security a priority for CISOs. But it’s only one piece of the puzzle.
Our state of ransomware readiness report shows that on average companies experience:
Four attacks per day
Six days down time
£628,606 ransom payment
Download the report to learn how...
72% of companies expected to be harmed in 2023 by a collaboration-tool-based attack. While 90% of companies are already seeing an increase in phishing.
Are you ready?
Download the report now to get the latest insights from 1,700 CISOs and other IT professionals as they present a realistic picture of the steps...
Phishing and ransomware were already critical threats before the health pandemic forced a sudden shift to remote working.
Osterman Research conducted an in-depth survey of security-focused professionals. Here are the key takeaways from the research:
Half of organizations believe they are effective at...
Yet another ransomware-wielding group of criminals has hit an organization in the health sector. This time, it's cybercrime group RansomEXX, which has been trumpeting an attack against the Scottish Association for Mental Health. The crime gang says it has stolen more than 12GB of data from SAMH.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...