The Biden administration has appointed Anne Neuberger, the deputy national security adviser for cyber and emerging technology, to coordinate the investigation into the cyberattack that targeted SolarWinds and other organizations, following criticism from two senators that the probe has lacked coordination.
Finding, triaging and investigating cyberthreats has never been more time-consuming, difficult or important for enterprises.
This white paper provides a detailed description of Cysiv’s modern, data science-driven approach to more quickly, effectively and efficiently detecting and investigating cyber threats, and...
A 24/7 SOC is an essential part of an effective cyber security strategy. It identifies, investigates and resolves threats that target your critical infrastructure, sensitive data, intellectual property, and ongoing business operations.
This whitepaper reviews what the key elements of a modern, world-class SOC are...
In order to detect actionable threats, organizations must collect, continuously monitor, query and analyze a massive volume of security telemetry and other relevant data for indicators of compromise (IOCs), indicators of attacks (IOAs) and other threats.
Doing this at scale, 24/7, across a hybrid cloud environment,...
After years of attacking networks and custom software, enterprising hackers found an easier attack vector and switched to attacking the application development process itself.
Hackers simply add their malicious code to common open source projects used by organizations and wait for the developers to add the code to...
Citing a lack of coordination and transparency, U.S. Sens. Mark Warner and Marco Rubio of the Intelligence Committee are urging the four federal agencies investigating the cyberattack that targeted SolarWinds and other organizations to designate a leader for their investigative efforts.
Banking institutions, cryptocurrency exchanges and other companies have begun implementing video-based identity verification. But deepfake technology can be used to circumvent these security checks, says Ilya Volovik, a researcher at Gemini Advisory.
Pre-IPO investments in Israeli cybersecurity firms totaled $2.9 billion in 2020, up 70% from the previous year, and exports of products and services increased as well, according to the Israel National Cyber Directorate. Security experts offer insights on the reasons behind the growth.
Companies are increasingly migrating data, applications and services from on-premises data centers to the cloud,
seeking to innovate, disrupt their markets and reap the benefits the cloud is delivering.
Despite the many advantages that cloud environments offer, organizations are facing new challenges and...
With its integrated applications and intuitive capabilities, Microsoft 365 has steadily become a corporate productivity
juggernaut since its introduction in 2011. In fact, Microsoft reported 200 million monthly users in its FY20 Q1 results, with commercial use
up 19% year over year as of FY20 Q4...
As the investigation into the hacking of a water treatment facility in Florida continues, cybersecurity experts say the incident points to the urgent need to enhance operational technology security. Here are five key questions the incident raises.
A hacker breached a Florida city's water treatment network, increasing the amount of lye that would be added to the water to a dangerous level. Officials say they caught the change immediately and reversed it. Reuters reports that the system was accessed via the city's TeamViewer remote access software.
As organizations pursue digital transformation initiatives and embrace more cloud services, data and workloads no longer exist in easily demarcated, on-premises private data centers.
In this more cloud-centric world, organizations must now safeguard employees and data, no matter their location. To do so,...
Get answers to all your questions about how to seize cloud opportunities and realize your business’ potential—while also protecting all your data beyond what’s possible on-premises—in this wide-ranging conversation among experts and thought leaders from Microsoft and Barracuda. And a sneak peek of the Cloud to...
Researchers with NetScout are warning that attackers are abusing certain versions of the Plex media server app to strengthen and amplify DDoS attacks. The FBI has also warned about increases in DDoS attacks that use these types of amplification techniques.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.