The bad guys are out there, watching and waiting for an opportunity to strike. They are gathering information about your organisation and users, devising the perfect plan to infiltrate your defences. What if you could see your organisation through the eyes of an attacker?
Attend this webinar to learn:
The...
Insider risk and data loss prevention (DLP) are a top concern for organisations today. And it makes sense, with a distributed workforce and increasing reliance on technology, legacy, on-prem DLP technology hasn’t lived up to its promises.
That’s because data loss begins with people, whether careless, compromised...
Today, tactical threat response is essential but insufficient: Organizations need a strategic approach to improving cyber resilience and overall protection for the long term.
Download the whitepaper to learn how native integration between Mimecast Targeted Threat Protection and Palo Alto Networks(r) Cortex Data...
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
As the Russian invasion of Ukraine escalates, organizations in the U.S. and Western Europe wonder: What is the potential blowback if the U.S. strikes back at Russia? Sam Curry, veteran CSO of Cybereason, reviews the possibilities and advises about how best to approach risk and preparedness.
According to a new threat report from Expel, business email compromise should now be viewed as "public enemy #1." Jonathan Hencinski of Expel is joined by Theodore Peterson of Datasite to support that claim and discuss how best to strategize against these schemes.
As cyber adversaries become more sophisticated, organizations are forced to constantly upgrade their security operations in order to stay a few steps ahead. This white paper will help you understand the current market challenges facing cybersecurity professionals and how to apply data science expertise to improve...
With API abuses expected to become the top threat vector in 2022, continued neglect can only mean yet more
successful cyberattacks.
This white paper shows the importance of including APIs in web application security testing and outlines a modern approach to vulnerability testing that covers the entire attack...
By identifying the 10 most common ATT&CK techniques used by adversaries, The Red Report by Picus Security helps security teams prioritize threat prevention and detection efforts. Its findings highlight the importance of a threat-centric approach and the need for organizations to continuously validate the effectiveness...
Britain's National Cyber Security Center has launched a trial vulnerability management project called Scanning Made Easy, designed to empower small and midsize organizations to identify if critical software flaws are present in their IT infrastructure, so they can be targeted for remediation.
How do you identify a BIN - Bank Identity Number - attack, let alone stop it? Ernie Moran, senior vice president of risk at Brightwell Payments, shares his experience of how he managed a BIN attack on his firm.
Has the notorious REvil, aka Sodinokibi, ransomware operation rebooted as "Ransom Cartel"? Security experts say the new group has technical and other crossovers with REvil. But whether the new group is a spinoff of REvil, bought the tools, or is simply copying how they work, remains unclear.
Cybersecurity in today's world is no longer primarily about the implementation of products or solutions. It is more about the analysis of behavior and the ecosystem. Krishnamurthy Rajesh of ICRA discusses the role of artificial intelligence and the need for collaboration among business functions.
Top U.S. cybersecurity leaders continue to warn against the peril of Apache Log4j vulnerabilities, confirming on Monday that hundreds of millions of devices worldwide are likely affected by the logging utility flaw, although the response, in terms of scope and speed, has been "exceptional."
Ten U.S. senators this week wrote to the secretaries of both the Department of Homeland Security and the Department of Transportation inquiring about specific measures they plan to pursue to prevent and respond to cyberattacks on the nation's critical infrastructure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.