Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
How many fires are you putting out before your first cup of coffee? How many before lunch? Why is it that security professionals seemingly can’t start their mission until 3pm? Prioritizing which parts of your business need to be fixed first is daunting and your day is likely preempted by account lockouts, breaches...
The speed at which we're seeing ransomware attacks has increased dramatically in the last couple of years - and it's only getting faster, warns Mary O'Brien, general manager, IBM Security. Ransomware deployment has increased from three months to four days on average.
According to this year’s SANS Threat Hunting Survey, threat hunting resourcing is an “ever-growing staffing nightmare.” 73% of this year’s respondents claimed that their biggest challenge is finding skilled staff. This is a 7% increase over 2022, and a whopping 43% increase over 2021.
This talent drought...
Organizations often face challenges when they aim to build sustainable security programs at scale. Anna Westelius, director of security engineering with Netflix, discussed the company's big infrastructure projects that give it more leverage over time than investing in manual processes.
Identity is now the first line of attack, so how can enterprises minimize their attack surface? Identity threat detection and response is a newly recognized cybersecurity solutions category. Sean Deuby of Semperis discusses ITDR and how enterprises can best take advantage of it.
It's getting harder to distinguish between normal and unusual threat activity, with more sophisticated attacks exacerbated by hybrid work and, soon, AI attacks. Defenders need correlated rather than isolated telemetry to get more signal and less noise, say Jeetu Patel and Tom Gillis of Cisco.
Cybersecurity is forever a growing concern for organisations of all sizes. The challenges include a spike in threats, the evolving technology landscape that increases the threat surface, the impact of regulation, too many isolated point products, and a lack of skills and budget for adequate defence.
Companies are...
Mandiant's 14th edition of M-Trends has been released, offering a comprehensive and insightful examination of the constantly evolving cyber threat landscape. Drawing upon Mandiant's extensive experience in incident response investigations and threat intelligence analysis, the report delves into high-impact attacks and...
This annual report shares the most significant data from our security operations center (SOC) in our threat detection and response efforts. It curates that data into trends that can impact your cybersecurity posture and offers resilience recommendations to protect your organisation and what to expect in 2023.
In this...
The onslaught of distributed denial-of-service, ransomware, data exfiltration and other attacks on the healthcare sector highlight the importance of optimizing the many sources of threat intelligence available today, says Taylor Lehmann, director of the office of the CISO at Google Cloud.
For many organizations, the massive shift to hybrid work brought on many unique challenges for an organization that is migrating to the cloud. There are some questions that have to be considered by that organization when aiming to store their data in the cloud – how is it being protected and who is responsible for...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
A lack of visibility makes it nearly impossible to protect an organization against attack. If you can't see what's lurking in the dark corners of your environment, all you can do is react instead of actively identifying and mitigating risks. But some technologies can help with threat visibility.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.