Recent security breaches have been devastating to targeted companies, both financially and in terms of their corporate reputation. Many of these have been external attacks, but insiders often pose a more insidious risk.
This whitepaper describes how these attacks occur, and highlight key capabilities that can...
As the use of Internet banking services continues to rise, so too does the potential financial gain for cybercriminals. Spear-phishing attacks and man-in-the-browser malware, usually referred to as Trojans, are highly advanced, hard to detect and even harder to counteract. To defend against these attack campaigns,...
Trojans are a very sophisticated type of malware and their use by cybercriminals to perform widespread eFraud is now well established. It has become apparent that cybercriminals are spending a considerable amount of time and effort to maintain control of the computers that they have infected. Blog articles and reports...
The burden of complying with regulations can be stressful, but the cost of a breach is too high to ignore.
Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through the HITECH Act have expanded the privacy and security regulations affecting your organization, as well as penalties...
Data exfiltration, network breach, identity theft, brand defacement... Enterprises are under attack. Traditional security methods have been unable to keep up with hackers in today's changing application environment. The success of improved network security products together with the increased attack surface...
For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence that the DDoS attack landscape is changing - from the perception of DDoS and the cost of DDoS attacks to the types of DDoS protection in place.
Download the...
The threat landscape has changed significantly in the past year, creating the demand for new security strategies. And with the
acquisition of Mandiant, FireEye also has changed significantly and now provides security strategies and solutions from first alert to
remediation.
In this transcript of the video...
As federal regulators step up enforcement of privacy and security requirements under the HIPAA Omnibus Rule, healthcare organizations face key compliance challenges, including dealing with their business associates and ensuring that patient information is adequately protected to avoid breaches. What are healthcare...
In this resource, Dr. Alan Snell, former CMIO, and Jeffrey Short, a healthcare attorney, share insights on medical device risks that are easily missed, and easily catastrophic, with repercussions ranging from HIPAA violations to patient harm.
More importantly, they offer guidance on what healthcare leaders can...
Security and risk professionals recognize the value and benefits of implementing an employee-monitoring program. Privacy advocates and legal and human resources professionals see potentially unwarranted invasion of employee privacy as reasons not to monitor, or at least to restrict monitoring to instances where enough...
The results of the 2014 Advanced Persistent Threats Survey bring home a stark reality.
Despite significant investments organizations have made in traditional security solutions, such as anti-virus, intrusion detection and encryption, they still are falling victim to costly security incidents as a result of APT....
IT research firm Gartner reports that the typical knowledge worker now uses four different devices per week to access office systems. So, it shouldn't be surprising that personally-owned computers are often being used to access critical business data and apps. What does this mean for the security of everything being...
As IT organizations begin to plan and implement their BYO programs for employee-owned Macs, PCs, smartphones and tablets in the workplace, the introduction of non-corporate devices opens up a veritable Pandora's box of liability that should be carefully addressed prior to any program's roll out. Confidentiality,...
In this white paper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible...
As the dark world of cybercrime evolves with new techniques, such as social engineering and planting insider threats, every company (large or small) is a potential target and no platform is off limits - even IBM i.
This white paper has everything you need to implement PCI's latest requirements smoothly, secure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.