Relationships with vendors are vital for many organizations, but the more data you share, the more risk you acquire. And mitigating this risk requires a degree of visibility into vendor systems that most organizations are hard-pressed to achieve.
Download this guide to explore:
Five of the most impactful...
In June 2015 the Healthcare sector once again received an overall SurfWatch Labs' risk score. On the vulnerability front, it was determined that most victims of the Stegoloader Trojan are North American healthcare organizations. The malware uses digital steganography to hide malicious code. Researchers believe...
It is hard to imagine the modern business without email. In 2012 alone, firms sent an estimated 89 billion emails per day. And that total could rise to more than 143 billion per day by 2017. Email-based attacks have long threatened organizations of all sizes. And as more users migrate to cloud-based "email as a...
Throughout 2014, cyber criminals expanded their potentially devastating attacks into many industries, including several that we had never before seen fall victim to a large number of threats. These threat actors have become increasingly sophisticated, using stealthy new tactics to move laterally and stay undetected...
In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it's not...
If you are an IT manager or administrator, you might have encountered compliance in this or that form. Though the topic is a hit these days, only few IT Pros can explain what compliance really means and what requirements it imposes on the IT processes within an organization. This free white paper is intended to...
What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security?
Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Consider for a moment the most vital operation in your enterprise. It might run financial processing around the world, control a city's electrical distribution, or handle
millions of passengers' airline reservations. What happens to your business if the computers directing such operations are hacked, sabotaged or...
Let's assume that your security operations are stellar. You have procedures in place to keep software patches up to date, and a team that responds to incidents within minutes. A relentless focus on security permeates your enterprise. In short, in-house you're doing everything right. But how about outside your...
Traditional signature-based, preventive controls, such as antivirus, no longer detect or stop targeted malware and other sophisticated endpoint attacks. Other so-called
"next generation" approaches lack deep visibility into endpoint activity and the ability to quickly alert when something seems unusual.
Download...
In 2014, RSA Conference and ISACA agreed to collaborate to examine variables contributing to the current state of cybersecurity. The result of the collaboration is this study, which offers a view into global activity and perceptions pertaining to cybersecurity-related issues. Read this study to learn about issues...
According to the State of Cybersecurity: Implications for 2015 report, cybersecurity now has executive support and increased budgets. Yet there is still a shortage of skilled professionals. This study provides an eye-opening look into cybersecurity at today's organizations and points to key issues that need to be...
The worldwide growth rate of digital data is alarming. Consider: According to the Compliance, Governance and Oversight Council (CGOC), an independent forum of data experts, 2.5 quintillion bytes of data are created daily. Analyst firm IDC declares that the amount of data is doubling every two years, and is estimated...
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's distributed-denial-of-service attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Pandrangi, VP of Technology at Verisign, has studied DDoS attacks, and he's...
When it comes to malware, how wide is the gap between infection and detection - and what is the potential business impact on organizations? Paul Martini, CEO of iboss Cybersecurity offers insights and strategies.
The gap begins with organizations having an over-inflated opinion of their own defenses, Martini...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.