In October, Missouri's governor accused a journalist of hacking after he alerted the state to exposed personal information on a state education website. Now, emails reveal that state planned on thanking him before it chose to pursue prosecution and that the FBI immediately dismissed the incident.
Watch this video for a discussion on the ever-evolving priorities and challenges that public sector agencies face today and the importance of building cyber resilience into your critical infrastructure.
Learn how the latest advances in privileged user monitoring can close windows of opportunity for attackers and keep business-critical data safe from credential theft, lateral attack movement, ransomware, and other threats.
The FBI says it has fixed a software misconfiguration that was abused to send fake emails falsely warning of a cyberattack. As many as 100,000 hoax emails were sent in two waves early Saturday morning, originating from a legitimate FBI domain.
Zero Trust: Is it the operational model that's going to propel us into a more secure future? Or just another marketing message to be tossed onto the pile of past campaigns? In this latest Cybersecurity Leadership panel, the top minds in the sector weigh in on the present and future of Zero Trust.
There's no question the attack surface has expanded exponentially over the past 20 months. But has attack surface management grown and matured to keep pace? Martin Sajon and Jason Hicks of Coalfire discuss the evolution and essentials of ASM.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
As vice president of Red Team Services at CyberArk, Shay Nahari has an up-close view of an enterprise's soft defenses. He sees adversaries attack workforce users and compromise credentials. The lines between identity and privilege are colliding. More than ever, Nahari says, context matters.
A newspaper reporter in Missouri who responsibly reported the exposure of Social Security numbers on a state government website has been accused of malicious hacking by the state's governor. The governor alleged the publication of the vulnerability after it was fixed was part of a "political vendetta."
As organizations look to streamline the way they work, they can introduce unknown cybersecurity gaps that make them vulnerable to a ransomware attack. CyberArk's Bryan Murphy shares insight on how CISOs and CIOs can implement a strong identity security program and prevent breaches.
Microsoft has indicated it will make changes to reduce the risk around what a security vendor says is a vulnerability that lets attackers run brute-force credential attacks against Azure Active Directory. The issue was reported to Microsoft in June by SecureWorks' Counter Threat Unit.
Dwell time, double extortion, supply chain attacks - ransomware has changed considerably over the course of the year, and CyberArk's Andy Thompson says there is much we can learn from the attacks - both the unsuccessful and successful ones - and how they take root.
Cyberattacks on third-party providers are far-reaching and dangerous for the global economy and supply chain. They are also not new; Target’s significant data breach in 2013 just brought them into the headlines. The fact that a vendor became an attack vector for hackers was a major "aha moment" for both...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.