The rise of 5G for business is accompanied by anticipation, but also anxiety. Will the expanded footprint of IoT create an unwieldy attack surface? Will the latency benefits of edge computing be worth creating a potential new strike vector? Don’t believe everything you read in the tech headlines.
In our next...
Before cybercriminals shifted heavily into ransomware, there was banking malware: sophisticated programs designed collect login credentials and intervene in transactions. A campaign using the Dridex banking Trojan has appeared in Mexico, says Metabase Q, a security company.
MediaMarktSaturn Retail group, a German multinational chain of stores, has confirmed to ISMG that it has suffered a ransomware attack. It is reported that the attack was perpetrated by threat group Hive and has affected store operations in the Netherlands, Belgium and Germany.
When it debuted, SD-WAN was a game changer in its own right. But wireless WAN - especially with the advent of 5G technology - now has the opportunity to rewrite the communications playbook, says Donna Johnson of Cradlepoint.
The calculus facing cybercrime practitioners is simple: Can they stay out of jail long enough to enjoy their ill-gotten gains? A push by the U.S. government and allies aims to blunt the ongoing ransomware scourge. But will practitioners quit the cybercrime life?
OK, so the trend is away from endpoint detection and response to extended detection and response. What does that even mean, and how can organizations get maximum cybersecurity protection from this shift? Cisco's Brian McMahon shares insight.
The U.S. State Department is offering rewards of up to $10 million for information that leads to the identification or location of members of the DarkSide ransomware gang and others who attack critical infrastructure. It follows the U.S. taking offensive cyber action against REvil, The Washington Post reports.
As the COVID-19 pandemic persists, cybersecurity threats and related risks continue to grow, including ransomware, external threats and especially those involving healthcare insiders, says Denise Anderson, president of the Health Information Sharing and Analysis Center.
IDG finds that automating security and compliance with tools like Ansible helps financial services organizations run comprehensive, efficient environments — including in hybrid clouds. In addition, automating configuration and system patches prevents human errors that hackers can exploit. A 2019 report by the SANS...
Typically, when manufacturing enterprises start to address IoT cybersecurity, there are the needs they know they have - and then the ones of which they are completely unaware. Entrust's David Low shares what needs to be done and where best to begin.
With cyber threats increasing, it’s vital for business leaders to understand and mitigate risks that could jeopardize their business. That understanding begins with effective risk reporting. But how is risk reporting successfully achieved?
Automating data collection and risk assessment helps provide your...
Wireless device makers in the European Union market will soon have to adhere to a new set of cybersecurity guidelines at the design and production stages of manufacturing, according to the European Commission. The guidelines target devices such as mobile phones, tablets and other products.
Federal regulators are reminding healthcare organizations about the critical importance of addressing security risks involving legacy systems and devices - including specialty software and gear - that are often difficult for entities to replace. What steps should entities take?
Roya Gordon of Accenture Security describes how rather than hunting for zero-day vulnerabilities, attackers are exploiting N-Day - or known - vulnerabilities. She also discusses how to better synthesize and act on threat intelligence.
Security and IT organizations must protect against new attacks at scale — and safeguard data in use, at rest and in motion — in radically cloud-centered environments where perimeters are fading as quickly as the distinctions between work and home. To do so, they need to leverage more intelligence, more automation...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.