Never have global financial institutions
faced such adversaries. The cybercriminal gangs now wield tools that
used to be the province of nation-states, and the nation-states now
engage in activities that once were owned by cybercrime. Scams
and schemes including account
takeover, denial of service and ransomware...
As a result of the COVID-19 pandemic, government agencies are under great pressure to provide prompt services to appropriate constituents, however, technological limitations and an unprecedented surge in demand have exposed gaps in fraud mitigation. IT systems will need to be better prepared to accomodate changes to...
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence. Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights.
A water trade association, at a congressional hearing Tuesday, urged the federal government to institute minimum cybersecurity standards for water systems. This comes as water providers see a big increase in the risk they face by connecting their legacy machines to the internet.
When it comes to advanced threat response, 42% of financial institutions say their current abilities are average. Only 35% say automation currently plays a strong role. Josh Zelonis of Palo Alto Networks and Sid Srivastava of Accenture analyze the State of Security Automation in Financial Services.
Pete Barker was a cybersecurity Digital Loss Prevention practitioner before joining SpyCloud as Director of Fraud & Identity. He saw first-hand the impact of COVID-19 on fraud incidents, which are more automated and broadly targeted. He explains how "COVID changed all the rules" and how defenders can raise their game.
Businesses are often ill-prepared to deal with ransomware incidents. Especially if an attacker has masqueraded as a privileged user—you may not know they’re doing any damage until it’s too late.
Every organization needs a well-defined, battle-tested incident response plan to combat ransomware. In this...
An Alabama clinic and an Indiana-based orthopedic practice have each reported hacking incidents discovered last fall that affected the information of more than 310,000 individuals in total. Both entities list various measures they are taking to bolster security in the wake of those incidents.
Unique BeyondTrust Labs Analysis of Ransomware and Phishing Trends & How to Mitigate Them. This research report provides insights and analysis into threats and privileged account misuse on Windows devices across the globe, and is based on real-world monitoring and analysis of attacks between Q1 2020 and Q1 2021...
Many of the workplace changes accelerated by the pandemic are expected to endure, and a more durable hybrid work environment is taking root. The hybrid workplace has been called a "cybersecurity nightmare,” and "a hacker’s dream". We have created this guide to help you understand the shifting threatscape and the...
Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses.
Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this...
Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks.
But how can organisations reduce risk by making humans the strongest link in the cyber defense line?
View this UK & EU Leadership Session lead by the Tech...
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.
Remote work presents many opportunities for businesses, but also has its challenges: How do you maintain security
throughout the business? How do you ensure employees have access to the resources they need to stay productive? Remote work doesn't need to be a challenge with the right password security in place.