Can you answer this question with a confident yes?
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
Most organizations don't even know when security controls have failed. This is a primary reason why intrusions...
So what's the mission of the newly launched Department of Health and Human Services' Health Sector Cybersecurity Coordination Center, and how will it function? HHS Deputy Secretary Eric Hargan explains the initiative and addresses top healthcare sector cybersecurity challenges in this in-depth interview.
As the threat landscape evolves, it becomes a game of survival of the fittest. Only the best attacks and attackers remain standing, and the result is a series of targeted ransomware attacks that now cost global enterprises millions of dollars per year. This is among the important findings of the Sophos 2019 Threat...
Less can be more when it comes to gathering, consuming and acting on threat intelligence, says Bryn Norton, director of solutions architecture and security at telecommunications giant CenturyLink.
Join our expert as we look into some of the most effective and crippling threat trends from the last quarter, including a rise in the use of cryptojacking with refined sophistication, making it harder to detect.
Join us to learn more about:
The current threat landscape and future trends to watch out for;
The...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
There has been so much hype around AI that seeing concrete examples of how the use of this technology can impact real world problems is often lost in the noise. This document takes a look at three scenarios from the Verizon Data Breach Report that have happened at specific organizations and details how AI can be...
Companies want to understand and implement threat hunting practices, but in reality - and with a limited budget - it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters. More often, organizations want to use that funding to shore up defense...
"Threat intelligence" has to be one of the most ill-defined and overused terms in cybersecurity today. With the market estimated to reach as much as $9 billion by 2020, the process of selecting the right threat intelligence solution to fit an organization's unique needs should be straightforward. Yet while business...
Malware continues to routinely evades organizations' cyber defenses. It lurks inside networks waiting to execute attacks that can cause significant damage. Automated Static Analysis of binary files enables security teams to unlock an array of new threat intelligence, hunting, analysis, and rapid response...
Threat intelligence analysts understand the near impossibility of searching global intelligence feeds to find the relevant threat information.
the underlying problem is the lack of visibility and context across internal files. Having more visibility to these risks and vulnerabilities makes global threat...
This survey report reveals that for many organizations, threat hunting is still new and poorly defined from a process and organizational standpoint. Most are still reacting to alerts and incidents instead of proactively seeking out the threats.
While the act of threat hunting cannot be fully automated, it heavily...
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities. Brian Duckering of Symantec discusses the rise and maturity of mobile threat defense.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities.
Mobile security should be taken just as seriously - if not more so - as traditional endpoints. Every employee behind a desktop computer also has at least one mobile device...
Businesses MUST address the proliferation of mobile devices in the workplace, whether authorized or not. For every laptop, there is a mobile phone, literally doubling the attack surface for hackers to breach your business and cause harm to you and/or your customers. While protection for traditional devices has long...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.