The global information security community is mourning the death of Raimund Genes, CTO for Trend Micro, on March 24 at the age of 54. His insight, clarity and wit will be missed.
Brexit is off to a messy start, with Britain making law enforcement intelligence sharing - including Europol and European Cybercrime Center participation - a bargaining chip in its EU divorce proceedings. Some European officials have slammed the move as blackmail.
As the threat landscape evolves, with risks exposed by newer technologies and commoditization of attack infrastructure, the motives of targeted attackers may also be evolving as they try new ways to influence change in an increasingly digital world.
The FBI recently warned that hackers are targeting FTP servers run by healthcare organizations in order to obtain medical records. New statistics show more than 750,000 FTP servers can be accessed anonymously worldwide.
Malware attacks are increasing, including ransomware like CryptoLocker, Locky, and zCrypt.
Businesses know it's essential to protect PCs from malicious programs, but many don't realize the value of server-level protection until the damage is done. Server-level protection from viruses and malware is essential, and...
Give the right users access to the right resources at the right times and for the right purposes.
Two-thirds of businesses have experienced data theft or corruption that originated within their organizations. But insider threats are difficult to control because your IBM i users need at least some level of access to...
Organizations in the financial services and insurance sectors face cyber threats from the following actors:
Enterprise
Hacktivists
Advanced persistent threat (APT) groups
Download this whitepaper to learn the cyber threats to the financial services and insurance industries.
With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy novel: targeted cyber espionage by one country on another; state-sponsored attacks on businesses to steal intellectual property; cyber...
When it comes to attack trends, we are seeing a much higher degree of sophistication than ever before. While nation-states continue to set a high bar for sophisticated cyber attacks, some financial threat actors have caught up to the point where we no longer see the line separating the two. Financial attackers have...
Impostor email threats, also known as business email compromise (BEC) and CEO fraud, have hit more than 7,000 companies since the FBI's Internet Crime Complaint Center (IC3) began tracking this type of scam in late 2013. Those that succeed can yield millions of dollars in fraudulent transfers.
Download this eBook...
The 2017 Magic Quadrant summarizes Gartner's yearly analysis of the Data Loss Prevention (DLP) market, examines the innovations driving that market and compares the positions of leading competitors.
Download the report to learn about:
DLP vendor evaluations, including strengths and cautions;
The Enterprise Data...
Since March 2016, the OCR has been increasingly aggressive in bringing enforcement actions against healthcare organizations who have had PHI compromised through data breaches.
Get this guide to learn the important aspects of the Health Information Portability and Accountability Act (HIPAA) and how an appropriate...
InfoSec professionals will perennially be challenged with more to do than time, budget, and staffing will allow. The most effective method to address this is through prioritization, and in the case of your growing data, prioritization comes from data classification.
In this guide you will learn what classification...
An analysis of British Home Secretary Amber Rudd's call for law enforcement to gain access to encrypted communications services, such as WhatsApp, leads the latest edition of the ISMG Security Report. Also, a preview of ISMG's Fraud and Breach Prevention Summit in San Francisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.