The onslaught of distributed denial-of-service, ransomware, data exfiltration and other attacks on the healthcare sector highlight the importance of optimizing the many sources of threat intelligence available today, says Taylor Lehmann, director of the office of the CISO at Google Cloud.
From heightened nation-state aggression to the procession of crippling zero-days, high-profile cyberattacks have escalated dramatically in the past year. CrowdStrike's 2023 Global Threat Report sheds light on each of these trends. Fabio Fratucello, field CTO international, CrowdStrike shares analysis.
Approximately 50% of ransomware attacks and breaches fielded by the Unit 42™ Incident Response team result from a common culprit: attack surface exposures.
Ransomware is no longer simply about encrypting files and asking for Bitcoin. New harassment tactics and double and triple extortion make the traditional...
The threat landscape is ever evolving. Modern threat actors constantly develop new tactics, techniques and procedures (TTP) so it's crucial to stay up to date with the latest strategies for protecting your organization.
Security experts from Unit 42™ have unveiled the most commonly observed TTPs in ransomware and...
For many organizations, the massive shift to hybrid work brought on many unique challenges for an organization that is migrating to the cloud. There are some questions that have to be considered by that organization when aiming to store their data in the cloud – how is it being protected and who is responsible for...
A number of disruptive trends emerged in 2022 that threaten productivity and global stability. Growing nation-state attacks coincided with organizations struggling to manage an explosive landscape of vulnerabilities that amplified systemic risk.
Stopping breaches requires an understanding of the adversary,...
The CrowdStrike 2023 Global Threat Report, a highly anticipated annual intelligence report for the global security community, examines the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them. Based on frontline observations from CrowdStrike’s elite threat intelligence...
Adversaries are relentless, and new research from CrowdStrike Intelligence reveals an increase in speed and sophistication in the last year. Meet these new and evolving adversaries, find out who they are targeting and what they are after. Stopping breaches requires an understanding of the adversary motivations,...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
As our business-critical applications are a blend of cloud and on-premise based and users need secure access to resources from everywhere, the traditional firewall approach no longer works. Our single network perimeter has evolved to multiple micro-perimeters.
For many organizations the application is the new...
The move to cloud email has allowed companies to streamline security investments and leverage the native Microsoft functionality provided by Exchange Online Protection (EOP) and Defender for Office 365 (MDO). But this approach isn’t perfect, and many companies have realized that they need an additional layer of...
No matter what aspect of cyber security you’re delivering, it takes both time and resources to properly plan, implement, tune, and manage an effective program. The MITRE ATT&CK framework is one of the fastest growing methodologies for structuring a cyber security program.
This white paper discusses the MITRE...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.