It's a fact: Technology trends such as cloud, mobility, and IoT have been key drivers of digital transformation. But how has this impacted networking and security?
Download the trend report to gain valuable insights so you can be prepared to keep up in a hyper-connected world.
As fraudsters continually refine their techniques to steal customers' credentials, organizations have found new ways to fight back with new tools that use behavioral biometrics and cognitive fraud detection.
It is critical to know how cognitive abilities would help in managing risks, compliance and governance as...
Even organizations that have a 24x7 SOC are finding it difficult to defend against threats in real time. And with the increasing sophistication in the threat landscape, SOC analysts are often overwhelmed with a deluge of information that instead of assisting the security team impairs it from responding to threats as...
Credit bureau Equifax has been hit with the maximum possible fine under U.K. law for "multiple failures" that contributed to its massive 2017 data breach, including its failure to act on a critical vulnerability alert issued by the U.S. Department of Homeland Security.
Online retailer Newegg is investigating a malware attack that may have stolen customers' payment card details for more than a month. Security firms have traced the heist to Magecart, a loose affiliation of cybercrime gangs also tied to payment card data breaches at British Airways and Ticketmaster.
November 1 ushers in a whole new era of breach notification requirements for Canada. What are the new standards, and how prepared are Canadian organizations? Attorney Imran Ahmad shares insights.
The biggest security budget in the business cannot save you from also suffering one of the biggest breaches. The key is: Do you have the right skills and technology deployed to defend your critical assets? Michael Malone and Ben Johnson of Datashield, an ADT company, make the case for outsourcing.
Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. So warns Europol in its latest Internet Organized Crime Threat Assessment.
If you're going to hack, why not go for the gold? That appears to have been the impetus behind an unusual data breach at the government-owned Perth Mint in Western Australia, which says personal details for 3,200 customers stored in an old database were compromised.
Hackers are constantly developing new exploits, and updating defenses is not an easy task. Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off.
From the sudden spread of WannaCry and Petya/NotPetya,
to the swift growth in coinminers, 2017 provided us with
another reminder that digital security threats can come
from new and unexpected sources. With each passing year,
not only has the sheer volume of threats increased, but the
threat landscape has become...
The threat landscape continues to evolve and cyber-attacks are more sophisticated than ever. Therefore, your endpoint protection needs to evolve too. Check out the latest Gartner report for leading industry insight in redefining Endpoint Protection Platforms. Also learn why Symantec continues to be
positioned...
A case involving alleged insider theft of protected health information from a hospital in New York illustrates why healthcare organizations need to take extra precautions to prevent similar incidents. Security experts offer recommendations.
Learn how securing your SSH inventory beyond your PAM solution helps compliance with NIST, FISMA, and CDM along with five steps you can take today to strengthen SSH security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.