Businesses targeted by ransomware attacks are increasingly willing to negotiate with - and even pay - their extortionists. But negotiating with cyberthieves is never a good idea.
Some legal and security experts are questioning the potential effectiveness of President Obama's new executive order that allows the U.S. government to block or seize the assets of individuals suspected of launching significant cyber-attacks
As more mega-breaches occur, cyber-insurers will more closely assess the security risks of potential clients, leading more organizations to improve their information security programs, attorney John Yanchunis predicts.
DDoS attackers have been targeting the popular code-sharing website GitHub. Security experts say the massive attacks appear to have originated from China and been designed to disrupt access to GitHub-hosted anti-censorship tools.
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
Just when you thought it was safe to go mobile, everything is different.
The risks are different. Only a few years ago, predictions stated that smartphones and tablets had little vulnerability to malware and hacking. But in the one-year period ending March 2013, malware aimed at mobile platforms grew 614 percent,...
Imagine an organization with no single place to find employee information across business units. Communications and collaboration would suffer. But an information portal would enable enterprise-wide searches and easy updates for basic information such as phone numbers. Or consider recently merged organizations. To...
Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.
The proliferation of smart devices has created a new breed of informed, always-connected shoppers, who demand real choice when it comes to selecting and purchasing goods. At the same time, breaches of sensitive information are announced almost weekly and retailers struggle to balance customer service and critical...
Financial services organizations are primary targets for increasingly sophisticated - and numerous - security attacks. In fact, a 2012 Ponemon Institute study revealed that 64 percent of US retail banks surveyed experienced a distributed denial of service (DDoS) attack during the previous 12 months. In September 2012...
Breaches happen. In today's high-value, high-stakes enterprise environments, many organizations rightly assume not only that their data and computing systems will be attacked, but that a certain number of attacks will succeed.
But recognizing the problem is only the first step - because the corollary to the...
The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today's security problems. Security needs to process a broader and richer data set including network and big data...
Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be that attackers and their dirty work have virtually no time at all. But in reality, many organizations give attackers all...
Security intelligence, built upon the same concepts that have made business intelligence an essential enterprise technology, is the critical next step for organizations that recognize the importance of information security to their business health. This is especially critical on today's smarter planet, where...
Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques, increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.