The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
Hackers have reportedly exploited the SS7 mobile telecommunications signaling protocol to drain money from online bank accounts used by O2 mobile phone subscribers. Despite rising security worries relating to SS7, many telcos have yet to explore related fixes.
A research survey of individuals with incident response (IR) responsibilities for their organizations has revealed that although these cyber security professionals understand that IR depends upon technology integration, cross-organization collaboration, and the ability to detect and prioritize security incidents, that...
Data breaches constantly threaten the modern enterprise. And the risk continues to grow: Time-to-compromise is now measured in minutes, and data exfiltration happens in days.
Why does it take so long to identify and respond to threats?
Download this whitepaper and learn why:
Lack of automation leads to hours...
The security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious actors to stop the growth of remediation costs, customer impacts, and reputational damage caused by data breaches.
Download this whitepaper and learn why:
Stopping breaches is a business...
Many companies today design their cyber security strategy around an incident centric approach - how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack. Join us to learn how a cyber strategy...
Organizations have more endpoints today than ever, and securing those endpoints is challenging, because it's rare that any one organization is responsible for all the endpoints that touch its network and servers, says Mike Spanbauer, vice president of research and strategy at NSS Labs.
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
Biometric adoption and demand by consumers is increasing rapidly. Next-gen solutions now exist for organizations to bring secure, frictionless authentication to their consumers using biometric solutions.
Download this eBook about biometrics and authentication that discusses:
Problems biometrics can solve for...
Cyber threats pose a risk to federal agencies accomplishing their designated missions. By following best practices to simplify security intelligence, an agency reduces the burden on its security operations team and allows technology to do the work of surfacing and responding to cybersecurity threats.
Download this...
When it comes to cyber risk, how must the CISO manage communications across the enterprise? The board, the staff and the line-of-business leaders all have different needs. Humphrey Christian of Bay Dynamics offers advice for the CISO in the middle.
Historically, security leaders have communicated mainly upward to...
Travel industry software giant Sabre has alerted hotels that its software-as-a-service SynXis Central Reservations system - used by more than 36,000 properties - was breached and payment card data and customers' personal details may have been stolen.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.