Today's threat environment is complex and dynamic. Organizations today face Advanced Persistent Threats (APTs) and organized, criminally motivated attacks launched by adversaries with the tools, training, and resources to breach most conventional network defense systems. These incursions are not conducted as...
Cyber Jedis know that Star Wars provides a wealth of incidents worthy of study. In fact, the entire story of Episode IV: A New Hope centers around the response to and consequences of a data breach, culminating in the destruction of the Death Star. If the Empire had been able to make sense of the intelligence they...
Migrating to a cloud-based service like Office 365 is essential for moving your business forward, but it's no walk in the park. Although this platform meets the needs of IT, the architecture leaves several gaps concerning security, legal, and compliance stakeholders that need to be addressed.
This white paper...
Cybercriminals are increasingly targeting mobile users, and when it comes to mobile apps, nothing is sacred. Many criminals mimic popular and trusted apps, tricking users into downloading them and then reaping the profits.
This white paper explores the dangers of malicious mobile apps and gives you advice on...
Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments,...
Every phase of the kill chain provides an opportunity to disrupt attacker activity. Without the proper visibility across your organization, you cant prevent the consequences and costs of a full-blown assault.
Download this eBook to:
Delve into the minds of hackers and learn how they plan, launch, and monitor...
As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways (SEG), Proofpoint uniquely combines a world class email gateway solution with the...
Reports on the Ukrainian energy supplier hack have left many crucial questions unanswered: Who was involved, did malware directly trigger a blackout and are other suppliers at risk from similar attacks? Cybersecurity experts offer potential answers.
The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.
Data breaches are a big problem. In the US alone, 2015 data breaches exposed more than 175 million individuals' personally identifiable information (PII), payment card details, protected healthcare data (PHI) or other private information. Sadly, it's no longer a question of 'if you'll be breached', but rather 'when...
Effective information security and compliance not only requires a well-defined governance strategy, but also the ability to intelligently manage risk. Organizations need to put controls in place to identify issues and potential violations, restrict actions that can be taken with sensitive data, and log activity. ...
The cloud will be a growing part of your IT environment. This is inevitable, particularly in consideration of economics of the cloud and the opportunities in the Internet of Things. While information technology does move rapidly and with a degree of unpredictability, a comprehensive risk management approach, designed...
A power blackout that recently affected about 1.4 million Ukrainians has been tied to an espionage Trojan called BlackEnergy. The attack appears to be the first time that hackers have successfully used malware to help disrupt energy-generation systems.
Expect rebooted European Union data privacy rules to drive organizations worldwide to begin minimizing the amount of information they collect and store on individuals in 2016, both to protect privacy as well as minimize the impact of data breaches.
Boards of directors that figure out how to leverage cybersecurity as a strategic asset will give their organizations a strong competitive advantage, says Lance Hayden of Berkeley Research Group. "Security needs to be part of what the organization uses to competitively differentiate itself."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.