In this week's roundup: an incident affecting News Corp and ransomware at Dish Network, Washington's Pierce Transit and the U.S. Marshals Service. Also: a DDoS attack on Danish hospitals from a threat actor that isn't what it claims and a bit of good news about a ransomware decryptor.
High street retailer WH Smith reports that it suffered a hack attack that led to the exposure of current and former employees' personal data, but no exposure of customer data or website disruption. It's the latest big British business in recent months to suffer a data breach or ransomware attack.
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
Complying with data privacy and security regulations can be a hurdle for many companies as they seek to thwart the growing number of cyber attacks. Implementing a privileged access management (PAM) solution can help improve your cybersecurity posture by satisfying security audit and compliance requirements.
This...
Identity Security is more critical than ever before in today’s modern business. But finding the right solution can be a monumental task. Cybersecurity decision makers must consider several key requirements to ensure they choose the right solution.
In this buyer’s guide to privileged access management, learn...
Advances to critical infrastructure technology is opening the door to threat actors and cyber attacks that can have catastrophic consequences to utilities around the world. Privileged access management solutions can help critical infrastructure operators and owners reduce risk, strengthen cybersecurity and comply with...
Privileged access management (PAM) is no longer a luxury among organizations looking to secure their most critical assets. It’s an essential element for an Identity Security program, representing one of the most effective strategies a business can implement to achieve its security and compliance goals.
There are...
Analyzing Identity Risks (AIR) 2022 is a statistical analysis of every Identity Risk Assessment that Illusive conducted during 2021 and includes real-world examples of how these identity risks manifest.
Discover the growing use of identity-based attack tactics in ransomware and other cyberattacks and also what you...
Every year, threat actors look for new ways to outwit victims and bypass defenses. As you might expect, different languages, cultures and levels of digital maturity mean some places are more vulnerable than others.
For our ninth annual State of the Phish report, we’ve put together in-depth regional summaries to...
Okta Identity Governance has enjoyed success in its first quarter of global availability as businesses unify access management and governance. Okta is surprised by the amount of traction its governance offering has gained with large enterprises and in competitive bake-offs, says CEO Todd McKinnon.
According to Gartner, by 2026, 50% of organizations will prioritize advanced data security features for inspection of data at rest and in motion as a selection criterion for SSE, up from 15% in 2021.
Needless to say the shifting to the cloud and the hybrid working has moved private apps, users, and data outside...
Decreasing time to market and uncovering new cloud revenue streams can increase profits as much as 11.2% year over year. By 2025, 95% of digital workloads
will be deployed on cloud-native platforms. To stay relevant and competitive during this age of digital transformation, cloud adoption isn’t optional.
...
The situation at LastPass keeps getting worse: The company says hackers implanted keylogger software on a DevOps employee's home computer to obtain access to the corporate vault. Customer vault data can be decrypted only with the end user master password, which LastPass doesn't store.
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.