The United Kingdom has announced two proposed pieces of legislation - the Financial Services and Markets Bill and the Economic Crime and Corporate Transparency Bill - to regulate the digital assets industry and curb the use of virtual currency in illicit activity.
Material Security has closed a $100 million funding round on a $1.1 billion valuation to extend its protection of sensitive content at rest beyond email. The startup will take patents for defending content in old emails and apply them to SaaS applications such as Dropbox, Google Drive and Slack.
Viasat's satellite communications suffered an outage an hour before the Russian invasion of Ukraine began on Feb. 24. The company said it was a cyberattack, but did not identify the attacker. The U.S., U.K., EU and Ukraine have now attributed this attack to Russia.
As the Russia-Ukraine war continues, what cybersecurity lessons should be learned? At the CyberUK conference in Wales, cybersecurity czars focused on surprises - including low online attack volume and the role of hacktivists - and lauded Ukraine's cyber resilience, honed by years of stress testing.
Russia's use of wiper malware, DDoS attacks and targeted disinformation show it no longer depends on traditional methods in its war with Ukraine. John Walker, a professor and counterintelligence expert, says organizations need to be "more realistic" about how they handle cyberattacks.
New CEO Bryan Ware plans to leverage LookingGlass' nascent attack surface management capabilities to capture clients in verticals such as pharmaceuticals, manufacturing and utilities. The company tapped former CISA leader Ware to serve as its next CEO following the acquisition of Next5.
Mimecast has released its latest State of Email Security Report, and it finds that 75% of companies were hurt by ransomware attacks in 2021 - up from 60% in 2020. Thom Bailey analyzes these results and discusses the role of emerging technology in building cyber resilience.
In this video interview eBook with...
Since existing security products are not adaptable to the way applications are being developed and pushed today, continuous security testing proves an ideal solution that helps in staying ready for any threat that is coming your way.
Download this datasheet to learn:
Why you should continuously test and tune your...
BAS is focused on validating the effectiveness of security controls. Due to its automated architecture, it also provides continuous visibility and quick mitigation insights unlike the traditional assessment methods.
Traditional assessments value is limited by:
The duration of testing
Scope
Human...
Starting out with MITRE ATT&CK can initially seem daunting. Containing over 180 techniques and 375 sub-techniques and distinct ways that attackers perform malicious activities.
In this blog, we offer advice to help you:
Become proactive in your approach
Respond to evolving attacker behaviors
Operationalize...
Cybersecurity as a Tier 1 threat for financial services, reports indicate that FSI companies experience fewer incidents successively each year.
On a negative one, FSI companies now need to deal with highly sophisticated attacks that are crafted to aim at their organizations specifically
Download this case study...
According to a report by Boston Consulting Group, financial institutions are 300 times as likely to be targeted by a cyberattack than other companies.
In this blog you will learn about the most common metrics used to assess the effectiveness of security controls:
Volume of alerts
% of false positives
Blocked...
Understanding the challenges that increase cyber risks faced by the financial industry is crucial to be resilient against cyber threats.
In this blog you will learn how the below challenges can be addressed in a holistic approach:
Continuous Digital Transformation and Innovation
Complicated Legislations and...
Ransomware is an epidemic companies can’t ignore. Malware attacks are
becoming more pervasive and sophisticated, while ransomware as a service
now targets governments and companies of every size.
The push for innovation has resulted in unprecedented software development.While this development has been...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.