Hackers will hack, but any attempt to attribute attacks back to an individual, group or state apparatus too often involves political agendas, cybersecurity marketing moves, attempts to deflect blame or outright errors of interpretation.
Hackers have apparently hijacked potentially thousands of vulnerable MongoDB databases and demanded ransoms for the return of critical data, with some victims paying up, according to security researchers.
A task force led by two lawmakers and a former U.S. CIO recommends the new administration should jettison outdated ways the federal government tackles cybersecurity, saying in a just-issued report: "Once-powerful ideas have been transformed into clichés."
The lack of a smoking gun - absolute certainty - has some security experts not entirely convinced that the Russians or their backers hacked Democratic Party computers in an attempt to sway the U.S. presidential election.
In this ebook, 33 security experts were asked how they communicate security program effectiveness to business executives and the Board. They share their recommendations and best practices.
If you're a security professional, you'll find their insights indispensable for helping you better communicate with business...
While malware attacks and data breaches continue to make headlines almost daily, the world's information security professionals are facing radical shifts in the enterprise attack surface as we move into 2017.
The Global Cybersecurity Assurance Report Card was created to measure the attitudes, beliefs and...
The Definitive Guide to Continuous Network Monitoring will give you the foundational knowledge you need for building a continuous network monitoring program in your organization. You'll learn why so many enterprises are abandoning periodic monitoring in favor of new methods for continuously identifying risks,...
Today's threat landscape is not getting any easier to manage. While the number of things you can do to reduce your risk posture is virtually limitless, no organization we've seen has the time or resources to do it all. That's why it's important to start with the activities that will make the most impact to your...
Don't overlook critical factors for vulnerability management solutions.
Cloud-based security solutions have the same benefits of other cloud applications: easy of deployment, ease of maintenance, scalability, performance and more. However, don't assume that every cloud security solution is equal.
Download this...
Advanced threats are multi-layered and borderless - and so are today's enterprises. These are among the factors pushing organizations to adopt the Intelligent Hybrid Security approach, says Anil Nandigam of NSFOCUS.
As the Trump administration begins, expect a ramp-up in cyber espionage as well as more "test attacks" by nation-states, says cybersecurity specialist Brad Medairy of the consultancy Booz Allen Hamilton.
An analysis of a National Institute of Standards and Technology initiative to identify algorithms that could defend encryption against attacks from quantum computers leads the latest edition of the ISMG Security Report. Also featured: An update on new FDA guidance on cybersecurity for medical devices.
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
Because cyber threats are becoming increasingly sophisticated, bolstering employee and customer awareness and training about ransomware, phishing and other cyber risks must be a top priority in 2017, says Curt Kwak, CIO of Proliance Surgeons.
Will more "historical" breaches be revealed in 2017 and beyond? Data breach expert Troy Hunt is optimistic that such revelations will become rare as large businesses operating online continue to improve security. But what about small and mid-size organizations?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.