After the occupation of the U.S. Capitol by pro-Trump rioters Wednesday, an emergency response plan to ensure federal computers were locked down apparently was not activated, some experts say. As a result, federal security teams are likely scrambling to detect and repair any damage done.
An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Are insurers getting cold feet over covering losses to ransomware? With claims due to ransomware skyrocketing, some insurers have reportedly been revising offerings to make it tougher for companies to claim for some types of cybercrime, including extortion.
The human factors of cybersecurity represent the actions or events where human error results in a successful hack or data breach. Other than hackers taking advantage of naturally existing weak entry points, your biggest threat and vulnerability could be coming from the inside. Whether it's a well-meaning employee who...
In January 2020, an independent research firm, commissioned by Veeam, completed a survey of 1,550 enterprises across 18 countries on what their data protection challenges and goals were. That research included 217 financial services organisations.
Read this report to learn about:
The results and insights from the...
Cloud adoption is on the rise. Thus, to guarantee their objectives and
their goals, more than a third of companies prioritize a strategy
adding infrastructure / services to the cloud and / or migrating
existing workloads to the cloud (public, private or hosted).
This guide provides tips on what features to...
2019 saw the biggest attack ever recorded but, overall, attacks were
smaller, shorter, and more persistent.
For some time now, carrying out a DDoS attack has no longer required any technical skills.
With a myriad of "stressing" or DDoS-for-Hire services available to carry out both network
and application layer...
To ensure data and services are protected against attack, DevOps is evolving to incorporate
cybersecurity practices across the lifecycle. Organizations need to take into account the fast-moving
nature of continuous innovation, and a rapidly evolving and fragmented threat landscape: otherwise
security can get in the...
Despite significant investments in common DLP and analytics technologies, breaches and theft of sensitive data continue to rise. This is because the data itself is only monitored, not protected. But what are the gaps in your current technology investments and how can they be filled?
To ensure data security and...
What will be the impact of the leak of investigatory documents from FinCEN - the U.S. Treasury Department's Financial Crimes Enforcement Network? For starters, experts warn that FinCEN reports may reveal sensitive information tied to banks and law enforcement agencies' investigatory tools and tactics.
A leaked database compiled by a Chinese company has suddenly become the focus of news media reports warning that it could be used as an espionage instrument by Beijing. But on closer examination, the alleged "social media warfare database" looks like public information largely scraped from social media sites.
In the three years since Equifax suffered a massive data breach, the consumer credit reporting firm says it has worked tirelessly to overhaul the security shortcomings that allowed the breach to happen. Equifax CISO Jamil Farshchi and other security experts weigh in on important lessons learned.
When implementing a cybersecurity risk framework, enterprises should use a structured approach to identity and evaluate and manage the risks posed by increased digital transactions during the pandemic, says Dmitry Chernetsky, global presales expert, Kaspersky-APAC.