The 2023 Data Breach Investigations report says that 83% of breaches involved external actors—with the majority being financially motivated. This snapshot highlights important takeaways for the Public Administration (NAICS 92) sector, which includes establishments of federal, state and local government agencies as...
C5 Capital extended struggling threat detection firm IronNet a financial lifeline contingent on retired four-star Gen. Keith Alexander stepping down as CEO of the company he founded. The venture capital firm will inject $51 million if IronNet hires ex-Houghton Mifflin Harcourt CEO Linda Zecher.
The newest challenge of 2023? Blocking threats before they attack.
60% of breaches occur because a patch was available for a known vulnerability but not applied and it can take less than 15 days for an attacker to exploit a discovered vulnerability.
With the ever-changing technology landscape, there is a...
Cyberattacks are proliferating rapidly and growing in scope as adversaries move laterally across the network and traverse diverse environments. As the Security Operations Center (SOC) works to deal with the increasing threat, they can find themselves overwhelmed by an unacceptably high level of false positives,...
The modern enterprise faces a growing security challenge involving the need to protect apps and data as your organization concurrently innovates and delivers new applications that are built, scaled, and operated differently in the modern cloud world.
This ebook is your guide to help you think about cybersecurity...
Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.
Cloud-native SIEM dramatically simplifies deployment and management, and increases ease of use, speed, and detection accuracy. As organizations grow, merge, and evolve, cloud-native security solutions can offload the costs of hardware and maintenance from IT teams and simplify operations for security engineers and...
Unlike other types of security threats, insider threats are complicated because only a few are caused intentionally, and they typically involve valid credential use. Beyond full- and part-time employees, insiders include vendors, customers, and others who can be working on site or remote. Frequently they’re...
In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.
Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
Prioritizing which parts of your business need to be fixed first is daunting and your day is likely preempted by account lockouts, breaches making headlines, and simply trying to answer your CEO’s questions, like “are we secure” and “how do we know?”
Watch this panel as we discuss how to use cloud-native...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.