The Cl0p ransomware group has been attempting to extort Thames Water, a public utility in England. Just one problem: the group attacked an entirely different water provider. Through ineptitude or outright lying, this isn't the first time that a ransomware group has claimed the wrong victim.
This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.
Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
Email continues to be the No. 1 source of cyberattacks and a significant point of risk for most organizations. Yet other
collaboration tools (e.g. Slack, Microsoft Teams, and even Zoom) are also emerging as points of risk.
Download the eBook to learn more about:
Configuration & Administration
Organizations that are relying on cloud-based email providers to secure their email systems and data should strongly consider adding a secure email gateway. Too many organizations are confusing the existence of security features with the efficacy of those features.
While moving enterprise email to the cloud has...
The UK Cyber Security Council is responsible for running the cybersecurity industry’s Cyber Certified Professional scheme. The council seeks to set the standard for chartered cybersecurity professionals and align with qualifications and certifications in the sector, says council CEO Simon Hepburn.
DevOps is a movement that enables collaboration throughout the entire software delivery lifecycle by uniting two teams: development and operations. The benefits of DevOps can extend to security by embracing modern secure DevOps practices.
The security team’s way forward is to unify with DevOps in its four key...
When it comes to protecting applications and APIs, the rules have changed. Many organizations still use security tools designed for an earlier era.
Download our eBook to discover the new rules for web app and API security and why:
Tools must fight intent, not specific threats
There is no security without...
The rapid adoption and growth of digital communication tools and application data requires a reassessment of corporate and regulatory compliance capabilities. I&O leaders should use Gartner's research to evaluate enterprise information archiving vendors and their ability to address these requirements.
Yet another ransomware-wielding group of criminals has hit an organization in the health sector. This time, it's cybercrime group RansomEXX, which has been trumpeting an attack against the Scottish Association for Mental Health. The crime gang says it has stolen more than 12GB of data from SAMH.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...
Personal information and records of 13 million people held by some of Britain's police forces reportedly has been stolen by Russian hackers. The Daily Mail Online reports that the cybercriminal gang Clop has released some of the data on the dark web after successfully breaching a Scotland-based managed service...
The newly published U.K. Cyber Security Strategy demonstrates "the depth of ambition that the U.K. has got for the cyber sector," says Dan Patefield, program head of cyber and national security at techUK. He discusses the opportunities and challenges the new strategy brings.
Could the internet of things be made more secure? A draft law in Britain would impose stronger cybersecurity regulations for manufacturers, importers and distributors of smartphones, TVs, toys and other "connected" digital devices, backed by the threat of fines of up to $13 million for noncompliance.