The latest edition of the ISMG Security Report features an analysis of why the FireEye breach is a wake-up call for the cybersecurity industry. Also featured: Monero cryptocurrency scams; key considerations for cloud security.
Watch this webinar with renowned cybersecurity innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner to lean about the biggest challenges facing security teams today.
A Florida-based company that provides support services to hundreds of dental practices in 20 states says it's been hacked, exposing information - including payment card numbers - on more than 1 million patients.
One of those responsible for the massive Mirai-based DDoS attack launched in October 2016 that targeted domain name resolver Dyn and knocked Amazon, PayPal, Spotify, Twitter and others offline has pleaded guilty to federal charges.
2020 was the year of mass migration to multi-cloud environments, which paves the way for 2021 and a further explosion on microservices and severless cloud computing. Peter Klimek of Imperva discusses how cybercriminals are likely to respond - and how to anticipate them.
The Norwegian parliament's investigation into the hacking of email accounts of some elected officials and government employees in August has found that the Russia-linked group APT28, also known as Fancy Bear, is likely responsible.
Because 2020 wasn't already exciting enough, now we have to worry about being hunted by adversaries wielding FireEye's penetration testing tools, thanks to the company having suffered a big, bad breach. Here's a list of targeted flaws that every organization should ensure they've patched.
The past year has been marked by economic uncertainty stemming from the global pandemic, which has also created an expanded remote workforce and broadened the attack landscape.
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
Successful customer identity management
Watch the Computer Weekly interview
Computer Weekly's Bryan Glick spoke to Max Faun from Okta to find out how you can deploy a successful identity management model.
How to make identity and access management work
Hear multiple real-world access management examples
The...
FireEye's disclosure this week of the theft of its penetration testing tools - and its proactive response - has drawn praise but raised many questions, as well.
The European Medicines Agency, which helps evaluate and authorize medicines and vaccines in the EU, says it's investigating a cyberattack. The agency is working on approval of two COVID-19 vaccines.
Government leaders are increasingly calling on cybersecurity researchers to better inform policymakers and are urging businesses to pay more attention to their in-house security teams, according to presenters at this week's Black Hat Europe virtual conference.
A hacking group behind an Android spyware variant has recently added fresh capabilities that include the ability to snoop on private chats on Skype, Instagram and WhatsApp, according to ReversingLabs. This APT group, believed to be tied to Iran, has recently been sanctioned by the U.S. Treasury Department.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.