The workplace is transforming, and keeping up with evolving security threats has become more critical and challenging than ever. Malware
attacks come from all directions with an overwhelming majority of successful breaches beginning at the endpoint. This means that having a
comprehensive endpoint management solution...
Keeping endpoint security up to date is a struggle for small to mid-sized companies that have less resources than larger companies, yet have the same risk of attack. And that risk is only increasing. In 2017, the number of ransomware attacks increased by 30x and the number of breaches increased by 40%.
Recent ransomware attacks against healthcare organizations and others demonstrate why rapid detection is critical to limiting the malware's damage, says cybersecurity expert Bill Dixon of Kroll.
The current state of endpoint security is a "good news / bad news" situation. The good news is that in recent years there has been a modest trend towards fewer vulnerability disclosures, meaning slightly fewer potential ways for computing infrastructures to be exploited. The bad news is that an increasing percentage...
If 2017 was the year of ransomware innovation, 2018 is well on its way to being known as the year of cryptocurrency mining malware. Numerous studies have found that the most seen malware attacks today are designed for cryptojacking. But while ransomware campaigns may be down, they're far from out.
The kill chain's evolution, geopolitical tensions, and the digitization of industries have all contributed to the staggering rise of the cybercrime economy.
Tom Kellermann, current chief cybersecurity officer at Carbon Black and former World Bank Treasury deputy CISO, surveyed 40 of the world's top financial...
Building your organization's cybersecurity maturity doesn't happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you've made an initial investment in security.
This whitepaper...
Employees at Mesa Systems, a residential, commercial and logistics-based transportation solutions provider, were being tricked with highly sophisticated spear phishing emails causing much confusion in the workplace and a ton of overhead for the IT Department. So what did they do?
This case study reviews how Mesa...
In today's dynamic healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. As attackers become more sophisticated, and as IT innovation continues to pick up pace, the escalation of cyber risk can easily overwhelm organizations with limited resources.
Download this...
The most costly attacks on ATMs are likely to be executed through the bank's corporate network. Although from inside the network, attackers cannot execute financial transactions on the ATM machines themselves, they can potentially gain access to the entire network of ATMs, as well as the related patch management...
Businesses that pursue digital transformation will face challenges with their ever-expanding attack surface, as well as their existing network and security architectures.
Download this report and learn why successful transformation requires the evolution of:
The traditional enterprise...
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.