Organizations must adopt a multi-layered, defense-in-depth approach to online security to combat today's threat landscape. Rather than relying on just one or two of the so-called 'next-gen' techniques in isolation, a robust, multi-layered approach should involve a vast array of signature- and non-signature based...
Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure.
Download this whitepaper that covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging...
To handle new forms of threats like cyber espionage or ransomware enterprises need to evolve their endpoint protection solutions to cover all threat surfaces.
Download this whitepaper to review the effectiveness of seven different products, on several different attack vectors and learn how you can make your...
IT environments continue to evolve beyond physical servers. Today, many important production resources operate on virtual machines (VMs) running on multiple hypervisors, and more organizations have been moving their mission-critical business processes offsite to the cloud. As a result, the requirements for protecting...
While the federal health data breach tally shows that hacker incidents continue to rise in 2017, regulators are offering up some insights from their investigations into a handful of ransomware-related breaches reported in 2016.
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
The U.S. Social Security Administration will implement multifactor authentication starting June 10, sending a passcode via SMS or email. The revised scheme comes after an ill-planned effort last July.
Since the major DDoS attacks of 2012, the threat landscape for financial institutions has dramatically evolved. Banks are now facing a whole host of problems including credential abuse, account takeover, and fraudulent money movements.
Download this interview transcript with Rich Bolstridge of Akamai Technologies...
Cyber criminals attack any organization, regardless of size. While enterprises typically rebound from the customer confidence problems and other issues that come after a data breach, some small and medium-sized businesses (SMBs) never recover. Within 24 months of a major data loss, 72% of businesses are forced to shut...
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
CISOs are increasingly being asked by management and boards to predict what the cost of a breach or cyber incident might be. But most still need to develop good predictive metrics, says Benjamin Dean, president of Iconoclast Tech.
As the practice of crimeware as a service matures, the defensive game for security leaders completely changes, says Michelle Cobb of Skybox Security. She explains how organizations should respond.
In his world travels, Steve Durbin of the Information Security Forum sees the global cybersecurity industry coming of age. But he also sees the steady maturation of cybercriminals and their schemes. How can organizations best counter the changing threat landscape?
As an assistant U.S. attorney in northern Georgia, Nathan Kitchens has seen scores of cybercrime cases - especially ransomware attacks and business email compromises. And he has two words of advice to potential victims: Be prepared.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.