Kaspersky Lab says that its original estimate of how many remote desktop protocol server credentials were offered for sale in the now shuttered online cybercrime marketplace xDedic may have been far too low, based on new data coming to light.
In the event of a "Brexit" - British exit - from the European Union following this week's referendum, the U.K. would likely still have to comply with EU data protection laws, but also face cybercrime-related policing and prosecution challenges.
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether...
With attackers getting more sophisticated every day, manual methods
of locating and testing web-based apps are no longer enough. The
right Web Application Scanning (WAS) solution can help you
systematically: discover web apps running in your network, determine
whether or not they are vulnerable to attack,...
Data is the currency of the digital age and
the lifeblood of organizations, so strategies to protect
corporate data are growing in importance and are now
a topic of C-suite consideration.
In a recent survey conducted
by IDG Research Services, investing in cloud services
ranks as the second priority (55%)...
CISOs are facing some of the biggest challenges,
regardless of company size, with
fast-changing technologies such as cloud
and security risk growing at an exponential
Download this interview with Qualys CEO Philippe Courtot to gain his insight on:
The biggest challenges facing CISOs today
As technology proliferates beyond traditional
systems and networks into mobility and cloud,
the lines around securing such expanded technology
are becoming blurred. Security threats
are coming in from all angles, and IT must stay
ahead of any vulnerabilities before they occur.
Download this interview with...
As a mid-sized or smaller organization, there is a lure of feeling safety in
obscurity. "We're too small to be a target for cyber attacks" is a common refrain
used to justify a lax network security posture. Unfortunately, it's a refrain that
may come to haunt you.
The truth is your company doesn't have to be...
When web applications are breached, enormous amounts
of sensitive business data can be lost.
These types of attacks can occur at organizations
of all sizes and levels of IT sophistication, and can
affect tremendous amounts of data.
Web applications are popular targets because they are accessible to almost...
As mobility and the global network infrastructure
expands, the need for security assessment
and policy compliance is essential.
Download this interview with Wolfgang Kandek of Qualys for insight on:
The top challenges for IT decision makers with current vulnerability management (VM) and compliance
Connecting with the global Internet exposes your
company network to many threats. Savvy criminals can use
the Internet to break into your network, sneak malware onto
your computers, extract proprietary information and abuse
your IT resources.
You can prevent most of these attacks by using a...
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control. Which is better approach to CASB - proxy or API? Rohit Gupta of Palerra shares his insight and recommendations.
The information security community's ability to respond to threats and vulnerability discovery improves with each passing month. However, attackers are also keeping up, or even exceeding the security world's defenses.One way to balance this problem is to not only focus on identifying the threat, but also to find an...
With the rapid business adoption of social media as a core communication channel, organizations are increasingly exposed to an array of internal and external security risks, especially those with significant social media presence. The FBI, Gartner and many other security analysts cite social media as one of the...