To shift from reactive to active defense mode, organizations need to get better at both threat-hunting and incident response. Too many organizations simply lack an incident response plan before they need one, according to Tim Bandos, Senior Director of Cybersecurity at Digital Guardian.
Download this interview...
More than15 years ago, the nation of Estonia rolled out a digital identity program for all citizens, allowing access to government services, banking, shopping - even voting. What lessons can global businesses learn from Estonia's example? Joseph Carson of Thycotic offers insight.
A federal judge has sentenced 32-year-old Russian hacker Roman Seleznev, aka "Track2," to serve 27 years in prison after he was convicted of defrauding 3,700 U.S. financial institutions of at least $169 million via point-of-sale malware attacks.
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
A recent survey of more than 300 CIOs and CISOs found that digital transformation is forcing them to rethink their cybersecurity strategies. Executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today's continually changing business...
Competing priorities and lack of integration between security and operations teams creates gaps in the security posture that leave businesses susceptible to increased risk and cyber attacks - commonly known as the SecOps gap. Businesses must align the priorities of the security and operations teams to reduce risk and...
The goal of secure operations automation is to improve processes and technology to unite IT Security and IT Operations teams with more focus on collaboration and visibility while allowing the IT Operations team to take a more active role in IT Security.
This report surveyed 318 participants from both technology and...
Despite efforts by companies to attract more women to careers in cybersecurity, the number of women in the field continues to be low. What can be done to change that?
Warning: Drop everything and patch all the Windows things now. That's the alert being sounded by security researchers in the wake of attackers adopting Equation Group attack tools designed to exploit an SMB flaw and install DoublePulsar backdoor.
A look at a Russian-speaking hacker offering novice cybercriminals a cheap way to conduct ransomware attacks leads the latest edition of the ISMG Security Report. Also, hear U.S. Homeland Secretary John Kelly address the cybersecurity challenges the federal government confronts.
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
The ransomware epidemic can be compared to the earlier heyday of viruses, albeit it is costing enterprises and individuals serious money. Charanjit Sodhi of Nomura Services takes a deep dive into the tactics used today and how enterprises can effectively counter them.
This monthly Security Agenda will highlight some of the most recent additions to our course library. March's edition features Gartner's Avivah Litan discussing endpoint detection and behavioral analytics. Other industry influencers like Wipro's CISO, Sunil Varkey, KPMG India's Sundar Ramaswamy, Kroll's South Asia...
Despite a slew of measures announced by the Modi government last year to encourage cybersecurity startups in the region, security experts argue that converting these plans to actionable policies and creating demand has proven difficult.
Intercontinental Hotels Group says that in addition to 12 hotels that it directly manages suffering a point-of-sale malware outbreak that began in 2016, 1,200 IHG-branded franchise hotel locations in the United States were also affected.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.