Modernizing IT infrastructures by simplifying and automating workflows and processes can unlock capabilities that deliver on the digital transformation goals of your organization. Infrastructure modernization efforts across government, telecommunications, retail and the financial sector are a logical step toward...
The Future Is Here; Go With It
Industry analysts see a major shift to software-defined storage (SDS), with SDS overtaking conventional storage by 2020. Container-based or container-native storage (CNS) is a big part of that move. Government agencies and organizations are better off accepting and adopting the...
CynergisTek's 2018 report aggregated ratings from security assessments performed at hundreds of healthcare organizations in 2017 to reveal an average 45% conformance with NIST Cybersecurity Framework (NIST CSF). The report found that of the NIST CSF five Core Elements, organizations had the lowest ratings in detecting...
Under Armour says an unauthorized intruder gained access to information for the accounts of 150 million users of its MyFitnessPal mobile app and website. Learn why some fear the breach could lead to a massive phishing campaign.
Police have charged 20 Romanian and Italian nationals with running spear-phishing attacks that stole more than $1 million from online bank customers. Phishing remains a favored criminal technique for harvesting account credentials and cryptocurrency, as well as corporate secrets.
Leading the latest edition of the ISMG Security Report: Ransomware hits the city of Atlanta, Baltimore's 911 system as well as aviation giant Boeing. Plus, WikiLeaks and its Julian Assange get taken for a ride by Russian intelligence.
With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.
Boeing says that a malware outbreak affected a small number of systems but did not disrupt production. An executive has reportedly identified the malware as being WannaCry ransomware and called for "all hands on deck" to respond to the incident.
Ecuador's embassy in London has again revoked internet access for seven-year houseguest Julian Assange, saying the WikiLeaks chief violated an agreement to not interfere in other countries' matters. WikiLeaks' star has continued to fall since it's been revealed to be an apparent Russian stooge.
Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.
Ransomware isn't an easy area to study. But a team of researchers has calculated the minimum paid by all ransomware victims over a two-year period, and found that nearly 75 percent of the bitcoins attackers received got funneled onto Russia's now-shuttered BTC-e cryptocurrency exchange.
Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?
Cryptojacking has erupted onto the cybercrime scene in recent months, thanks to the surge in value during 2017 of cryptocurrencies such as Bitcoin, Monero, and Ethereum.
Crooks are aggressively targeting servers and even whole networks in order to mine for cryptocurrency on other people's computers. Simply put, you...
Antivirus solutions have traditionally focused on stopping the malware that uses the exploits rather than the exploits themselves. While there are millions of different pieces of malware in existence, hackers only use 10's of different techniques to exploit software vulnerabilities. By blocking these exploit...
Smart hackers coordinate their attacks across your system. Now you can outsmart the hackers by coordinating your defenses by enabling your products to work together and respond automatically to threats.
Download this whitepaper and learn:
The benefits of coordinating your security;
Why synchronized security means...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.