In an in-depth interview, Verizon's Ashish Thapar analyzes the results of the company's latest Data Breach Investigations Report, noting, for example, the spread of cyberespionage in several sectors worldwide. He also shares insights on effective mitigation strategies.
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Word that President Donald Trump's cybersecurity executive order could be unveiled in days leads the latest edition of the ISMG Security Report. Also, large Australian companies anticipate rise in information security risk.
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
Australian companies are improving their cybersecurity, but fear the impact that incidents could have on their operations. The finding comes from the first-ever cybersecurity survey of Australia's largest companies.
You know the risk of a cyber incident when it comes to finances or operations. But what happens if your company's reputation suffers?
In today's cyber risk environment-especially with the rapid spread of information over social media-companies are becoming more and more concerned about how a cyber incident could...
New documents dumped online by the Shadow Brokers group have revealed apparent NSA programs designed to target SWIFT service bureaus in the Middle East as well as a slew of exploits designed to infect Windows systems, patched last month by Microsoft.
Good news for Microsoft Windows users: The Equation Group exploit tools dumped this month by Shadow Brokers don't work against currently supported versions of Windows, largely thanks to patches Microsoft released in March. But who tipped off Microsoft?
This paper identifies key requirements of a flexible security framework, and explores how enterprises can use APIs to extract signals that enhance their existing security ecosystem.
Download the Framework for Resilient Cybersecurity and learn how to:
Evaluate the threat landscape;
Choose the right security tools...
The recent fix for a zero-day flaw in Microsoft Office appeared more than five months after Microsoft was privately alerted to the flaw, and followed months of it being exploited via in-the-wild attacks. Can Microsoft do better?
When it comes to vulnerability management, many organizations opt to protect only their most critical security gaps - but, meanwhile, the criminals exploit the secondary vulnerabilities. Kevin Flynn of Skybox Security explains why context is everything in managing vulnerabilities.