How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.
Thou shalt not reverse engineer Oracle's products. That was the stunning diktat issued by Oracle CSO Mary Ann Davidson in a blog post that some are reading as a declaration of war against the security research community.
Chapter 7 of Intelligent Cloud Data Protection says "With the vast majority of data breaches due to compromised user credentials, it is not enough to simply encrypt information. Access to encrypted data through the StratoKey gateway is constantly analyzed and profiled to detect a vast array of threats and...
When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be.
Read this global survey of nearly 400 information security executives to learn why organizations are currently ill-prepared to:
Defend their critical data
Deploy security controls to evolve with...
The APT gang known as Darkhotel quickly tapped a Hacking Team exploit for Flash, Kaspersky Lab reports. But the gang's ongoing trickery shows that organizations must do more than just patch against the latest threats.
As a report surfaced that Chinese spies read the private emails of top Obama administration officials, the Pentagon revealed it had restored the unclassified email network used by the Joint Chiefs of Staff, brought down two weeks ago following a purported Russian breach.
In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Download this white paper, "Endpoint Security for Business: Technology in Action", to learn about:
Threats you can see and those you can't;
The...
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Unfortunately, this is not the script for a crime drama. Since many victims are willing...
Cyberattacks can be the downfall of an organization's reputation. News headlines are filled with stories of major corporate data breaches across all industries.
To effectively navigate the increasingly sophisticated and complex threat landscape and keep your organization out of these kinds of news stories, you need...
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn't enough.
Kaspersky Lab recommends focusing on prevention and mitigation of advanced threats. Our Global Research and Analysis Team (GReAT) wants to help...
With the increased usage of mobile devices, the IT model is changing and it is important for organizations to provision information on a just-what's-needed, just-in-time basis from centralized servers consolidated in the cloud. However, this must be executed properly to avoid a data breach.
Download this...
Cloud applications and technologies are becoming increasingly mainstream across organizations worldwide: Two-thirds of global executives now have a cloud strategy in place within their organization. While the majority of executives realize the benefits, data security and privacy concerns remain the biggest challenges...
Today, ransomware has emerged as one of the most troublesome malware categories of our time. In this research, Symantec looks at how different types of ransomware work, not just from a technological point of view but also from a psychological viewpoint. The research also examines how these threats evolved, what...
Millions of Android devices are at risk from "Certifi-gate," a flaw that OEMs must patch, Check Point warns. Following Stagefright, Google and some manufacturers have promised to deliver monthly Android patches.
U.S. officials say Russians coordinated an attack on an unclassified Pentagon email system used by the Joint Chiefs of Staff that's been offline since late July, according to NBC News.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.