ISMG caught up with 11 security executives in Las Vegas on Tuesday to discuss everything from open-source intelligence and Web3 security to training new security analysts and responding to directory attacks. Here's a look at some of the most interesting things we heard from industry leaders.
The ongoing Russia-Ukraine war has featured cyber operations being used to target Ukraine as well as Russia. But CyberPeace Institute, which tracks cyberattacks tied to the conflict, has so far seen 27 different countries being affected by more than 300 attacks, and many have affected civilians.
Combining the back-end data analytics of Google Chronicle with Mandiant's ability to identify signals of abnormal behavior on the front-end is an unbeatable combination, John Watters says. Google agreed in March to purchase threat intelligence and incident response titan Mandiant for $5.4 billion.
Everyone gets phishing emails. Not everyone falls for them. Find out how vulnerable users are today’s biggest cyber threats in our eighth annual State of the Phish report. This year’s report dives deep into today’s threats—and how prepared users are to face them. Get a wealth of data, insight and advice based...
Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.
Are your IT investments layering on visible and hidden costs? Companies adopting SaaS solutions aren’t only adopting new technology; they’re changing how they operate. But are your investments in IT solutions improving your agility or layering on hidden hard and soft costs that slow down your business?...
Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.
Vulnerabilities do not provide a comprehensive threat landscape but allow companies to feed their own risk analysis or an initial risk assessment. To provide insight into the threat landscape for ICS, Verve’s research team looked at updating the analytical comparison completed last year regarding the trend of ICS...
The role of cyberattacks in Russia's war against Ukraine continues to evolve as the conflict persists, but one notable takeaway so far is the precision of the military's online attacks, which is likely an attempt to avoid spillover that would anger NATO, says Ian Thornton-Trump, CISO of Cyjax.
Reliance on the cloud, new devices, and transformative services, also means growing threat vectors and increasingly complex environments. In this brief guide, a 3-step roadmap for innovation in security operations is explored.
You can see how to rapidly mitigate ever-changing security risks, despite more...
Protecting the organization against email-borne threats is only becoming more difficult as attackers create new and more clever ways to fool users and embed threats and malware.
The best SEG solutions provide better protection than older products or those that are available with an email platform...
Recorded Future has purchased malware analysis startup Hatching to give its clients better visibility into active campaigns in the wild. Data gathered by Hatching's malware sandboxing tool will benefit both companies, providing clients with a view of malware trends, targets and sources.
McDonald’s Corporation is the world’s largest restaurant chain. Just like every organization, McDonald’s is concerned that threat actors are targeting their employees across the world. It only takes one person to click on a malicious link and create a data breach. Thus, one of their key initiatives is empowering...
Obtaining threat insight is like practicing judo - you want to use your attacker's power against them.
In this eBook, Chris Borales, senior manager of product marketing at Gigamon, and Tom Dager, CISO of Archer Daniels Midland Company, review how to keep pace with the evolving ransomware landscape and discuss:
The...
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence.
In this eBook, Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights on how to:
Improve...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.