The cybersecurity landscape is morphing at a more rapid pace than ever. Hundreds of sophisticated hacking campaigns and reckless proliferation of sophisticated malware threats over the last few years have left security teams struggling to contain these threats and protect their organizations at a time when the...
Security practitioners have been working hard to find ways to operationalize threat intelligence for IT environments. But with many security teams now being put in charge of OT security as well, understanding and mitigating OT threats is a whole different ball game. From uptime to visibility and asset discovery, CISOs...
At a time when security professionals are faced not only with a barrage of threats, but with a myriad of threat intelligence data sources, it can be challenging to know when to stop an investigation. Join DomainTools Senior Security Engineer Tarik Saleh to learn essential methodologies from a blue team perspective.
Cybercrime gangs continue to update or issue fresh versions of malware to mine for cryptocurrency, deliver crypto-locking ransomware, steal passwords and facilitate online bank account heists, according to new research reports.
Can you answer this question with a confident yes?
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization?
Most organizations don't even know when security controls have failed. This is a primary reason why intrusions...
So what's the mission of the newly launched Department of Health and Human Services' Health Sector Cybersecurity Coordination Center, and how will it function? HHS Deputy Secretary Eric Hargan explains the initiative and addresses top healthcare sector cybersecurity challenges in this in-depth interview.
As the threat landscape evolves, it becomes a game of survival of the fittest. Only the best attacks and attackers remain standing, and the result is a series of targeted ransomware attacks that now cost global enterprises millions of dollars per year. This is among the important findings of the Sophos 2019 Threat...
Less can be more when it comes to gathering, consuming and acting on threat intelligence, says Bryn Norton, director of solutions architecture and security at telecommunications giant CenturyLink.
Join our expert as we look into some of the most effective and crippling threat trends from the last quarter, including a rise in the use of cryptojacking with refined sophistication, making it harder to detect.
Join us to learn more about:
The current threat landscape and future trends to watch out for;
The...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
There has been so much hype around AI that seeing concrete examples of how the use of this technology can impact real world problems is often lost in the noise. This document takes a look at three scenarios from the Verizon Data Breach Report that have happened at specific organizations and details how AI can be...
Companies want to understand and implement threat hunting practices, but in reality - and with a limited budget - it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters. More often, organizations want to use that funding to shore up defense...
"Threat intelligence" has to be one of the most ill-defined and overused terms in cybersecurity today. With the market estimated to reach as much as $9 billion by 2020, the process of selecting the right threat intelligence solution to fit an organization's unique needs should be straightforward. Yet while business...
Malware continues to routinely evades organizations' cyber defenses. It lurks inside networks waiting to execute attacks that can cause significant damage. Automated Static Analysis of binary files enables security teams to unlock an array of new threat intelligence, hunting, analysis, and rapid response...
Threat intelligence analysts understand the near impossibility of searching global intelligence feeds to find the relevant threat information.
the underlying problem is the lack of visibility and context across internal files. Having more visibility to these risks and vulnerabilities makes global threat...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.