It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.
Europol, along with local police in Spain, Romania and Austria, arrested about two dozen alleged members of two criminal gangs that are accused of stealing millions in euros from bank accounts in several countries by using SIM swapping techniques to steal credentials and passwords.
As the COVID-19 pandemic intensifies, public health efforts are being complicated by ransomware attacks continuing to hit healthcare facilities that are not only handling cases but also running frontline virus-testing labs.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
President Donald Trump has signed legislation that bans telecommunication firms from using federal funds to buy equipment from companies that are deemed a "national security threat" and provides funding for "rip and replace." The measure takes aim at Chinese firms Huawei and ZTE.
Facebook and Twitter have removed dozens of suspicious accounts after investigations found that many of them operating out of Ghana and Nigeria had ties to Russian groups attempting to spread disinformation to U.S. voters in the months before the November presidential election.
The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors.
Threat intelligence consumers must realize the limitations faced by producers and formulate their own analysis and integration of third-party threat intelligence to incorporate other sources to fill in gaps where possible.
Download this report and learn how:
Malware-exclusive analysis may miss vital aspects of a...
With a threat landscape constantly in flux, it isn't just CIOs, CISOs and CSOs who need reliable insights into cyber risk. The rest of the C-suite and board must factor in cybersecurity data as a key risk metric - or expose the business to the everyday reality of cyberattacks.
If you're looking to drive C-suite and...
The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
A poor customer experience and insufficient security in the account opening process has been shown to directly and negatively impact long-term customer loyalty, retention and profitability. So, how do you provide a better and more secure customer experience in the digital account opening process?
More than 100...