The Shadow Brokers is offering more Equation Group attack tools for sale, payable in bitcoins. Experts say the dump appears designed to deflect attention from Russia's alleged meddling in this year's U.S. presidential election, but it may have originated from a rogue NSA insider.
Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.
Return on investment is an important factor for evaluating the
value of your security infrastructure. This informative white
paper, 5 Ways to Maximize the Value of Security and Monitoring
Tools, guides you through the most cost-effective solutions,
including the role of a visibility architecture in your...
As enterprise IT teams look into moving their critical workloads from on-premises traditional data centers into virtualized, software-defined data centers (SDDC), or even public clouds, they often face a number of important questions:
How can we ensure the availability, reliability, and performance of our mission...
President Barack Obama, saying the United States will retaliate against Russia for conducting hacks aimed at influencing the American presidential election, strongly suggests that Russian President Vladimir Putin authorized the cyberattacks against Democratic Party computers.
A third suspect alleged to be responsible for the 2014 JPMorgan Chase data breach, which affected more than 83 million customers, was arrested Dec. 14 after reportedly voluntarily returning to the U.S. from Russia.
A report foreseeing homegrown hacktivists showing their displeasure with President-elect Donald Trump by launching cyberattacks against U.S. government sites leads the latest edition of the ISMG Security Report. Also, the details behind the 1 billion-record hack of Yahoo.
Yahoo has the dubious distinction of having not just one but two record-shattering historical breaches come to light this year. The latest breach to be revealed, which dates back to 2013, involved the potential compromise of 1 billion accounts.
Hack attack victims often ask two questions: "Who did it? And can we hack them back?" But after an attack, with time of the essence for blocking further damage, those are the wrong questions for breached organizations to be asking, data breach response expert Alan Brill says in this audio interview.
The following brief will analyze data from over 700,000 customer devices using SolarWinds® MSP Risk Intelligence technology. The goal in sharing this data is to escalate the urgency for CISOs to improve communication with their businesses. The collected data answers:
What sensitive data do organizations typically...
How much time and effort will consumers put into protecting themselves from identity theft and financial fraud? That was the question posed by Aite Group's Julie Conroy in researching the new Global Security Engagement Scorecard. And the answer might just surprise you.
This new whitepaper from Akamai Technologies illustrates the priorities and challenges financial institutions face as they progress along their transformational journey.
Download this whitepaper to examine:
While financial services institutions recognize the need for investment in user experience and mobile...
Hours after President Obama directed intelligence agencies to conduct a full review of alleged efforts by the Russians to influence the 2016 presidential election, reports surfaced that the CIA in a secret report concluded with "high confidence" that the Kremlin tried to influence the vote in favor of Donald Trump.
Many organizations in India and Asia are woefully unprepared for timely breach detection and incident response. It takes hundreds of days on average before a breach is identified, according to various studies. This an indication of how far behind the industry is from attackers that the attacks and compromises made two...
In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.