The Black Hat Europe information security conference returns to London, featuring 40 research-rich sessions covering diverse topics, including politically motivated cyberattacks, recovering passwords from keyboards thanks to thermal emanations, hacking Microsoft Edge and detecting "deep fakes."
As the threat landscape evolves, it becomes a game of
survival of the fittest. Only the best attacks and attackers
remain standing, and the result is a series of targeted
ransomware attacks that now cost global enterprises
millions of dollars per year. This is among the important
findings of the Sophos 2019...
About 33% of small-to-medium enterprises suffered ransomware attacks in the last year. Experts agree that stopping ransomware is nearly impossible, so the best defense today is rapid detection, response and remediation.
Download this white paper and learn:
Best practices for protection;
The dangers of paying the...
Nation States have unlimited resources to build cyberweapons. Coordinated Crime Syndicates steal those cyberweapons & use them or sell them, causing massive destruction. We need a cyber "red phone" dialogue available with other nations, but the internet is a nefarious nation's best friend.
Come & hear how just a few...
Enterprises are challenged to move the process of accounting for data in a structured, systematic way higher on the list of priorities. One option to accomplish this challenge is by applying application threat modeling principles to data (data threat modeling). Application threat modeling provides value by allowing...
Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
To combat cyber threats like the exposure of Personally Identifiable Information (PII), solutions need to keep pace with fraudsters through prevention and quick response when attacks happen.
The application of intelligence-driven fraud mitigation has transformed security and fraud management strategies by...
Because phishing attacks are so pervasive, aggressive staff educational efforts are essential, says Richard Conti of The Children's Hospital of Philadelphia, who also discusses other risk mitigation steps.
For security professionals, learning about the details of individual attacks is key to understanding the impact to their own environment. And that is exactly what this new report provides.
Download the 2018 State of the Internet / Security Report and learn from 12 months of stories drawing on key attacks such...
Organizations in all sectors struggle with mitigating the insider threat, but it's an acute concern in healthcare, where patients' lives are at stake. Pete Nourse of Veriato outlines specific threats to this sector.
In the latest edition of the ISMG Security Report, hear prosecutors discuss the indictments of two Iranians in connection with SamSam ransomware attacks. Also: Updates on allegations that Google is violating GDPR and cryptocurrency's impact on crime trends.
Digital automation of all business processes globally is compelling enterprise fraud risk and vigilance teams to leverage cybersecurity tools to predict business fraud. It's critical to know how human behavioral analytics, machine learning and orchestration can play important roles.
The session addresses:
How...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.