By building in some risk intelligence upfront, organizations can upgrade their security operations centers and reduce the noise from the sheer volume of alerts and false positives, says Ganesh Prasad of RSA, who shares insights.
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
Our goal with this report has always been to track the ever-shifting contours of the cyber-threat landscape and communicate what
we're seeing to our readers.
Generally speaking, the TLI is based on the premise that if organizations are seeing more threats more frequently, then things are
getting worse. If the...
As the threat landscape evolves, it becomes a game of
survival of the fittest. Only the best attacks and attackers
remain standing, and the result is a series of targeted
ransomware attacks that now cost global enterprises
millions of dollars per year. This is among the important
findings of the Sophos 2019...
The cybersecurity landscape is morphing at a more rapid pace than ever. Hundreds of sophisticated hacking campaigns and reckless proliferation of sophisticated malware threats over the last few years have left security teams struggling to contain these threats and protect their organizations at a time when the...
Security practitioners have been working hard to find ways to operationalize threat intelligence for IT environments. But with many security teams now being put in charge of OT security as well, understanding and mitigating OT threats is a whole different ball game. From uptime to visibility and asset discovery, CISOs...
At a time when security professionals are faced not only with a barrage of threats, but with a myriad of threat intelligence data sources, it can be challenging to know when to stop an investigation. Join DomainTools Senior Security Engineer Tarik Saleh to learn essential methodologies from a blue team perspective.
Cybercrime gangs continue to update or issue fresh versions of malware to mine for cryptocurrency, deliver crypto-locking ransomware, steal passwords and facilitate online bank account heists, according to new research reports.
Can you answer this question with a confident yes?
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
Most organizations don't even know when security controls have failed. This is a primary reason why intrusions...
So what's the mission of the newly launched Department of Health and Human Services' Health Sector Cybersecurity Coordination Center, and how will it function? HHS Deputy Secretary Eric Hargan explains the initiative and addresses top healthcare sector cybersecurity challenges in this in-depth interview.
As the threat landscape evolves, it becomes a game of survival of the fittest. Only the best attacks and attackers remain standing, and the result is a series of targeted ransomware attacks that now cost global enterprises millions of dollars per year. This is among the important findings of the Sophos 2019 Threat...
Less can be more when it comes to gathering, consuming and acting on threat intelligence, says Bryn Norton, director of solutions architecture and security at telecommunications giant CenturyLink.
Join our expert as we look into some of the most effective and crippling threat trends from the last quarter, including a rise in the use of cryptojacking with refined sophistication, making it harder to detect.
Join us to learn more about:
The current threat landscape and future trends to watch out for;
The...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
There has been so much hype around AI that seeing concrete examples of how the use of this technology can impact real world problems is often lost in the noise. This document takes a look at three scenarios from the Verizon Data Breach Report that have happened at specific organizations and details how AI can be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.