Recent ransomware and phishing attacks have heightened the need for identity security for insurance companies who own financial information, social security numbers and health data for their customers. In today’s digital world, insurance companies must get identity right, and getting it right means ensuring that...
Today's IT and security professionals manage distributed endpoints while supporting digital transformation initiatives, cloud migrations and a distributed workforce. Needless to say, they're stretched thin.
It's time to re-evaluate one's approach to endpoint security, but there's a lot of noise in the market. Cut...
The Google-Mandiant marriage will combine Google's security monitoring tools with Mandiant's threat intel and attack surface management solutions, plus new SOAR and file and URL analyzer capabilities, to create an "end-to-end threat intelligence and cybersecurity operations suite."
Hackers have appropriated a red-teaming tool to hack their way into organizations, warns the Department of Health and Human Services. Tens of thousands of organizations each year are affected by a hack involving Cobalt Strike. But companies can spot the tool and should act quickly if they do.
A recent Deloitte digital transformation report found that organizations with higher digital transformation maturity ratings reported 45% revenue growth. Blurry digital boundries is the main reason more companies aren't digitalizing. The ambiguity supplies many opportunities for accidental data leaks and...
The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.
We have seen how ransomware can cripple an enterprise. But what about the threat of downtime revenue disruption - what toll can it exact? Tia Hopkins of eSentire discusses the role of managed detection and response in preventing downtime disruption.
A compromise assessment answers the all-important question: Have you been breached? Even the most secure organizations routinely commission such assessments because attacks evolve, and corporate security cannot always keep up.
Download this whitepaper to learn more about:
Lifecycle of a targeted attack;
...
It’s estimated that 300,000 new pieces of malware are created and an average of 30,000 websites are hacked every day, a speed that makes it very challenging for security systems to recognize the newest threats.
By examining trends in ransomware targets, it is becoming clear that some threat actors are motivated...
Ransomware actors have intensified their attack campaigns by threatening critical infrastructure shutdowns, risking public health and safety, diverting vital public resources, and impacting data privacy.
Early detection of the intrusion allows an organization to accelerate their response, minimize the impact of...
Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor. The hackers are believed to be at large, likely in China.
As budgets tighten in anticipation of economic hardships, cybersecurity threats only continue to grow. Bill Bernard, CISSP of Deepwatch, advises security leaders to consider how senior management and the board view cybersecurity and then adjust how you prioritize people, technology and managed services.
In this...
The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.
The process of alerting a user of a compromised account is a long one. Join our panelists as they debate the best methods for shortening that process while still maintaining and even upping the efficiency.
View this webinar to learn:
How a modern data observability solution can interpret massive amounts of data in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.