Fresh warnings are being sounded about the threat posed by semi-autonomous killing machines both on and above the battlefield, especially as lethal weapons continue to gain features that push them toward full autonomy. Experts say international norms and legal safeguards are overdue.
What do zero-day detection, alert prioritization and patching support have in common? They are all among the "must-haves" of endpoint detection and response solutions. Hiep Dang of Qualys discusses the must-haves and how to communicate the ROI of EDR.
VMware's Tom Kellermann is out with Modern Bank Heists 5.0, his latest look at the attackers and attacks targeting financial services. Subtitled "The Escalation," this report looks at the increase in destructive attacks, ransomware and hits on cryptocurrency exchanges. Kellermann shares insights.
Security control validation (SCV) is the foremost use case of Breach and Attack Simulation to help organizations answer the essential security questions needed to become threat-centric:
Test and measure the performance of security controls individually
and collectively
Obtain actionable insight to maximize...
The British government has been alerted multiple times in recent years that officials' smartphones appeared to have been infected with spyware built by Israel's NSO Group, as part of nation-state espionage campaigns targeting Britain, human rights watchdog Citizen Lab says.
Many companies are investing in Data Loss Prevention (DLP) solutions. However, according to the Fall 2021 survey by Proofpoint, even with a DLP solution, respondents still worry about being vulnerable to data loss.
Download this whitepaper to read on:
Why DLP solutions are inconsistent;
Different DLP...
This whitepaper looks at ways you can use CIAM to strengthen the perimeter around your customer data. From fine-tuning the balance you achieve between security, privacy for your customers, and the user experience they get when visiting your site to consolidating your user data into a single source of truth, CIAM can...
There are numerous threats targeting identity systems. Are you familiar with them all? In the first four months of 2021 alone, Auth0 observed more than 87,000 attempts to brute force multifactor authentication. For the inaugural State of Secure Identity report, Auth0 shares insights from our own trends and analysis to...
U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.
Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.
In our latest report, we detail seven primary cyber threats that organizations across the financial services sector will face in 2022. Some of them, such as ransomware, are not new but nevertheless remain a serious threat. Others, such as decentralized finance (DeFi) and cryptocurrencies, are newer, so to speak, and...
In order to keep pace with the card fraud threat landscape, financial institution CISOs must continually refresh their awareness and understanding of card fraud tactics, techniques, and procedures (TTPs). Even for the novice cybercriminal, there are few barriers to entry and near-infinite resources in illicit forums...
Claroty’s Biannual ICS Risk & Vulnerability Report offers a comprehensive look at industrial control system (ICS) vulnerabilities publicly disclosed during the second half of 2021, including those found by Team82 and those found by affected vendors, independent security researchers, and experts inside other...
Targeted attacks on a Ukrainian energy facility have been confirmed by CERT-UA. In a joint operation carried out by the Ukrainian CERT with security companies Microsoft and Eset, it was found that an ICS-capable malware and several regular disk wipers were used in the attack.
As use of Apple devices has grown in the enterprise, the company has increasingly become a target for malware threats and other attacks. ISMG spoke with experts and CISOs about the seriousness of these threats and what organizations can do to mitigate the risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.