The operators of the Necurs botnet continue to target victims with phishing campaigns designed to infect them with banking malware, ransomware and cryptocurrency fever, as well as to generate profits via dating website referrals.
Whether it's insider or third-party vendor access, organizations are realizing they need to do more with their privileged accounts and systems. But traditional approaches often leave organizations with wide gaps in security. Sam Elliott of Bomgar explains what companies need to look for when it comes to access...
Technologists are wrangling with an identity puzzle: Is it possible to create a single digital identity that can be seamlessly and securely used at a bank, a hospital or consumer websites? It's the holy grail of identity. But experts say blockchain is likely not the answer right now.
When building a next-generation cybersecurity operations center, or CSOC, organizations must first understand their attack profile and determine the scope of threat monitoring needed, says Jagdeep Singh, CISO at Rakuten India, an e-commerce company.
Leading the latest edition of the ISMG Security Report: Why some organizations with working backups still choose to pay a ransom after suffering a cryptolocking malware attack. Also featured: The U.S. government's push to bolster the private sector's "active defenses."
To address growing concerns about Aadhaar, the Unique Identification Authority of India, which administers the ID program, is taking two key steps to add a layer of security. But some observers are already questioning whether the move will prove effective.
Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older chipsets but also its newest CPUs - in both client devices and data center servers - to reboot much more frequently than they should.
Data has never been as valuable. Some see it as "the new oil": a gusher of crude material that can be refined to create vast power and wealth. Today, data can identify patterns and trends that lead to opportunities or help to mitigate risks.
Preparedness, technology tools, smart thinking and expert counsel will...
There are two broad camps of readiness with regard to GDPR. Opportunists are starting from a position of relative advantage. They generally have better information governance processes in place and are more likely to have more mature security capabilities. They seek to leverage these attributes, adopting best data...
A recent incident involving an Indiana hospital that publicly admitted to paying a $55,000 ransom to unlock data following a ransomware attack - despite having backup systems - highlights the need to test data recovery plans.
BlackBerry mobile devices have become a rare sight. But drivers of Audi, GM and Mercedes vehicles may be using the company's embedded operating system in their cars, and with a new tool called Jarvis, BlackBerry is also making a play to secure the code used to drive autonomous vehicles.
As a longtime investor in companies offering cybersecurity solutions, Alberto Yépez of Trident Capital Cybersecurity is most concerned by a lack of investment in one key area; replacing aged technologies that are supporting critical infrastructure industries, such as power utilities.
Savvy and sophisticated MSPs are always looking for ways to add additional value to their offerings and engagement with their customers. By enhancing their capabilities, MSPs are able to differentiate their service, be more proactive, and command higher margins.
Security is often discussed as one of the most...
Keeping pace in today's digital world requires a need for speed and flexibility - especially when it comes to backing up business intelligence on behalf of your customers. Fast backup means you can schedule backups
as your customers' business imperatives demand. That means their data can be current when it comes time...