Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region due to an explosion in its information and communications technology infrastructure, and this is changing the risk profile.
when addressing the advanced capabilities required to...
The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.
The fact that Federal agencies are prime targets for the most sophisticated cyber threats is undeniable. If cyberattacks are inevitable, then robust capabilities for security investigation, threat hunting, and rapid response are essential. Government cybersecurity professionals require visibility across their silos of...
When it comes to attack trends, we are seeing a much higher degree of sophistication than ever before. While nation-states continue to set a high bar for sophisticated cyberattacks, some financial threat actors have caught up to the point where we no longer see the line separating the two. Financial attackers have...
In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
This session will focus on illustrating how nation states and complex actors leverage their resources effectively in attacking campaigns. Specific attacking techniques will be discussed in detail. We will discuss how obfuscation techniques are used to blind defenders and also delve into the complexities of defending...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.