Why does it take so long to identify and respond to threats? Security and IT professionals point to one primary culprit: the disconnect between security and IT tools. Traditional approaches hamper efficient incident-response coordination across organizations.
Download this whitepaper and learn how to solve security...
According to Verizon, 81% of hacking-related breaches involve either stolen and/or weak passwords. By eliminating multiple passwords and individual application log-ins, Single Sign-On (SSO) not only improves security posture, but significantly increases IT efficiency and user productivity.
While Single Sign-On...
The California attorney general's office has smacked Cottage Health System with a $2 million settlement in the wake of breaches in 2013 and 2015. What lessons can be learned from this significant enforcement action?
The steady stream of new reports about years-old breaches continues as Imgur, the popular photo-sharing service, belatedly warns that it suffered a breach in 2014 that compromised 1.7 million users' accounts.
As cyber-crime evolves, attacks are complex and creative, and often tailored to the targeted industries and organizations. Therefore, to respond appropriately, one must engage in advanced threat hunting that takes the human factor in consideration.
Today, most of the cyber security community focuses on technical...
Like its mythological namesake, the source code for Zeus malware appears to be immortal. New variants continue to surface, including the Terdot banking Trojan, which is also designed to steal email and social networking credentials while remaining hidden.
A presentation on new models to battle email phishing leads the latest edition of the ISMG Security Report. Also, did Uber mishandle ransomware response?
HyphBot botnet malware is forcing infected PCs to sneakily view high-priced video ads, allowing fraudsters to reap upwards of $1.3 million in daily ad spending, a Danish advertising technology firm warns. The scheme highlights the challenges facing online advertisers seeking legitimate viewers.
Give crooks credit for topicality: They remain loathe to miss a trick. Indeed, hardly any time elapsed after Uber came clean about the year-old breach it had concealed before crack teams of social engineers unleashed appropriately themed phishing messages designed to bamboozle the masses.
U.S. prosecutors have unsealed an indictment against an Iranian man charged with trying to extort entertainment company HBO for $6 million in bitcoins. The case marks a rare public naming of someone accused of cyber extortion, which poses an increasing risk for all organizations.
U.S. government agencies now find themselves having to comply with Binding Operational Directive 18-01 to enhance email and web security. What are the immediate tasks? Patrick Peterson of Agari offers insight and advice.
We all see the headlines about high-profile breaches that started because of a phishing exploit. But how severe is the global email infiltration problem? Patrick Peterson of Agari offers insight and advice.
Download this guide that provides tactical guidelines to assist Federal agencies in complying with the DHS Binding Operational Directive (BOD) 18-01 requirements.
This guide details:
Required Actions Overview
Required Actions - Email Security
Required Actions - Web Security
Status of Implementation
Roles and...
To meet the DHS Binding Operational Directive (BOD) 18-01, Federal agencies were required to submit an agency plan of action to improve email and web security by November 15th.
If this deadline came and went without submission - we have you covered.
Download this guide to creating an effective agency plan of...
Embark on your journey to becoming compliant with BOD 19-01. The DHS has mandated that all federal agencies implement DMARC for email security in 2018.
Download this whitepaper and get started with DMARC and prevent users from being subjected to phishing attacks spoofing agency identities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.