Security teams and risk professionals consistently ensure the effectiveness of their cyber defense mechanism. The ongoing pandemic has intensified their challenges as they now have to ensure cyber resilience for their organizations in a hostile open environment. As organizations looked to quickly adjust to the new...
Discover the latest trends to see where risks are growing and how you can defend against them.
Results from the Verizon Mobile Security Index (MSI) 2021 report show that 62% of employees currently work remotely—that’s nearly double pre-pandemic numbers.
With remote workers accessing valuable corporate data...
To defend against cyberattacks, it's important to "demystify" cybersecurity and break it into risks that can be managed by any organization, says Ciaran Martin, the former director of the U.K. National Cyber Security Center.
By issuing a sweeping cybersecurity executive order on Wednesday, the Biden administration is attempting to take a critical step to address security issues that have come to light after recent cyberattacks. Here's an analysis of the order's key elements.
Vulnerabilities in the way you manage identities and credentials are easy targets for cyber attackers. Sophisticated bad actors know how to fully exploit them to steal your most valuable IP and data, disrupt your operations and destroy your reputation with customers.
This eBook presents five ways your teams can...
We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead.
By attending this session, you...
Effective vulnerability management requires more frequent scanning of infrastructure, says Steve Yurich, CISO at Penn National Insurance, who explains his organization's approach.
A bombshell news report suggests that Dutch mobile network provider KPN in 2010 didn't know if one of its major equipment suppliers - China's Huawei - was spying on users. Viewed 11 years later, the report stands as a reminder to constantly review and address risks posed by suppliers.
In an unprecedented action, the FBI is removing web shells from on-premises Microsoft Exchange servers at organizations in at least eight states that were infected in a wave of attacks earlier this year. Security experts offer an analysis of the bold move that the FBI took without notifying the organizations.
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.
Customers drive your business growth, but their trust in your brand depends on protecting them from fraud and cybercrime.
Studies have shown that customer churn rates are 3.9% higher for businesses that have suffered a customer data breach and 35% of consumers use false details when creating accounts - because they...
Citing national security concerns, the U.S. Commerce Department has placed seven Chinese supercomputer organizations on the Entity List, which effectively bars them from receiving supplies or components from U.S. companies.
After the 2008 financial crisis, reform was developed to strengthen the financial resilience of the financial sector but broadly omitted cyber threats and risks.
Yet cyber threats pose a significant challenge to the operational resilience, performance and stability of the financial sector.
Join this session and...
The Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from the past 12 months, analyzes the trends, and includes viewpoints from security experts. This provides a consolidated view and analysis of Microsoft patch Tuesdays, providing a crucial barometer of the threat landscape for the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.