The high-visibility, high-yield and low-cost nature of ransomware attacks have made them a favorite with cybercriminals in 2017. The commoditization of the attack tools and infrastructure, and the availability of ransomware kits as services has further compounded the challenge for organizations. Mobile ransomware is...
Who is behind the threats that face your organization? To implement security measures that put your attackers on defense, you must know their profile and motivations.
Download this infographic and learn about:
The motivations of different attackers;
The different tactics attackers deploy;
How threat intelligence...
Enterprise intelligence combines human-led analysis and computer-driven analytics to provide actionable insights for your enterprise, so you can disrupt and neutralize threats.
Download this infographic and learn:
How often insider misuse is responsible for security incidents;
The average cost of a single data...
In the face of advanced persistent threats and attacks, it's critical for organizations to measure vulnerability to threats before applying machine learning tools, says Rohan Vibhandik, a scientist at ABB Corporate Research Center.
Determined attackers constantly find new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle. Knowing who is behind the threats you face and what their motivations are can help you implement security measures to put them on the defensive.
Organizations and analysts need the ability to shift threat intelligence from a data feed into actionable results - this is the core of applied threat intelligence (ATI). Organizations need to move their thinking away from viewing data breaches as a onetime event and instead recognize that with every incident they are...
Enterprise Intelligence is an ongoing practice in which organizations analyze disparate data sources to identify the vulnerabilities and threats across the enterprise.
Download this infographic and learn:
How much more likely analytically driven organizations are to respond to security threats;
What percent of...
The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
Health insurer Anthem has agreed to a proposed $115 million deal to settle a class action lawsuit over a 2015 cyberattack that resulted in data breach affecting nearly 78.9 million individuals. If approved, lawyers say it would be the largest data breach settlement ever.
Hackers can breach air-gapped voting machines and tallying systems in an attempt to alter ballots to sway the outcome of an election, a Senate panel has learned. Also, at the hearing, DHS discloses that Russian hackers targeted 21 state election systems before the 2016 election.
Concerns over Russian hacking of state election systems are mounting. In New York, Gov. Andrew Cuomo has ordered a review of security efforts related to state elections. On Capitol Hill, Sen. Mark Warner wants DHS to release additional details relating to cyberattacks targeting state election systems.
When it comes to breach preparation, it isn't just about protecting IT assets. Increasingly, the conversation is about reputational risk management, says Jacob Olcott of BitSight Technologies.
In an interview about reputational risk management, Olcott discusses:
The intersection of cybersecurity with...
Criminals have long aimed to separate people from their possessions. So for anyone who follows ransomware, the WannaCry outbreak won't come as a shock. Nor will longstanding advice for surviving ransomware shakedowns: Prepare, or prepare to pay.
Microsoft has issued emergency security updates for some unsupported operating systems to protect against the global WannaCry ransomware outbreak. In addition, a researcher has accidentally disabled new infections from crypto-locking PCs, though he warns the respite will likely be temporary.