Good news on the cybercrime front: "Cryptocurrency-related crime fell significantly in 2020," compared to 2019, reports blockchain analysis firm Chainalysis. Unfortunately, in the same timeframe, ransomware profits surged 311%, stoking calls for a crackdown on ransom payments.
Businesses that have had to support virtual services and remote workers have taken bold digital transformation steps during the pandemic. The momentum they’ve achieved, as a result, will be difficult to let go. Securing the changes already implemented as well as the changes yet to come in the ‘next normal’ is...
Threat hunting and incident response are critical roles of security operations center (SOC) analysts. With the ever-rising sophistication of new and emerging attacks, analysts need an edge to stay ahead of adversaries.
This paper describes the MITRE ATT&CK framework including:
What the model offers to SOC...
Attacks have become increasingly sophisticated, and often are invisible and undetectable by legacy security solutions. You read about these successful data breaches almost on a daily basis. Security analysts do what they can with legacy tools, but these tend to swamp analysts with alerts that are difficult to...
Cyber criminals are taking advantage of the
economic uncertainty plaguing the Oil & Gas industry.
Download this summary to learn more about the true cost of cyber dangers facing
the industry and how control your third party risk.
In the new EMA research report, Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation, the analyst Shamus McGillicuddy explores how network-based technology is the foundation of Zero Trust.
Shamus highlights that the Zero Trust model is a continuous cycle of establishing a...
Cybersecurity has long been a
challenge across industries. Now that
most organizations are firmly in the age
of digital transformation, protecting
against threats is increasingly complex
but also crucial to shield against
financial and reputational damage.
With hybrid infrastructures accommodating
In 2020, the "zero trust" conversation evolved from "What is it?" to "How do we achieve a zero trust architecture?" Chase Cunningham, principal analyst serving security and risk professionals at Forrester, offers an outlook for what we can expect in 2021.
New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson.
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.
While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were...
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but also grounded...
The growth in the use of telehealth during the COVID-19 crisis means that healthcare providers must carefully reassess and bolster the security of the connected devices, applications and systems used, says Kelly Rozumalski of the consultancy Booz Allen Hamilton.
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
Not every message or piece of data is for everyone’s eyes. That’s the basic premise of why organizations need encryption. But how does it work? Do you need different types of encryption for different situations? Can encryption be integrated with your existing business technology?
Download this report to learn...