The city of Atlanta's ransomware outbreak cleanup and response tab has hit $2.6 million after a March attack froze corporate servers, employees' PCs and resident-facing portals. Some security experts say the breach response funds would have been put to better use preventing the outbreak in the first place.
Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview about the activities of a hacker group the company has dubbed "Orangeworm."
Great news: "SunTrust to offer free identity protection ... at no cost on an ongoing basis." Of course, nothing comes for free, at least for 1.5 million customers of the Atlanta bank, whose personal details may have been sold to criminals by a former employee.
The endpoint remains the favored attack surface for criminals, yet most cybersecurity solutions rely on detection rather than prevention, says Gregory Webb, CEO of Bromium.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
Organizations too often prioritize data breach prevention at the expense of data breach response - or vice versa, depending on current fashion - when an emphasis on both remains mandatory, warns Art Coviello, the retired chairman of RSA.
Against today's threat landscape, the security operations center takes on greater importance - and so does the movement to automation. Dario Forte of DFLabs discusses how to employ SOC automation to boost incident response.
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
Security experts are weighing in on whether a new alliance of four competing telecom companies formed to offer a portfolio of cybersecurity services will prove successful.
Department of Homeland Security Secretary Kirstjen M. Nielsen warns that the U.S. will more aggressively move to punish those who conduct cyberattacks. Plus, the department plans to soon unveil a new cybersecurity strategy. Complacency, she says, "is being replaced by consequences."
Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.
Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders.
Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.