The ISMG Security Report leads with an analysis of how tactics used by Kremlin-tied actors to target political groups in France, Germany and the U.S. to influence foreign elections could be employed to damage the reputation of businesses.
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
The government of India is taking the data protection and privacy bull by the horns, gunning for comprehensive data protection legislation within the next 5 months. Experts offer an analysis of what the nation needs.
Word that President Donald Trump's cybersecurity executive order could be unveiled in days leads the latest edition of the ISMG Security Report. Also, large Australian companies anticipate rise in information security risk.
President Donald Trump last week failed to meet a self-imposed, 90-day deadline to issue a report on "hacking defenses." But let's not nit-pick. After all, cybersecurity is complex - something the president is likely discovering along with healthcare and tax reform.
The European Banking Authority (EBA) recently published its long-awaited final draft of the Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2).
Download this whitepaper to learn:
Download this eBook to discover:
The latest social engineering attack methods
The transaction authorization weaknesses
How to minimize the risk of social engineering attacks
Industry best practices and use cases
The vast majority of people today rely on mobile devices everywhere they go, and they expect their phones to accomplish just about everything... including fully enabled banking services. But as common as they are, mobile phones are still perceived by many as relatively insecure. Hacks happen, and the vulnerability of...
Unlike desktop applications, mobile apps are harder to secure because they are often written with no built-in security. Delivering mobile apps that are secure and usable increasingly requires invisible technologies like RASP (runtime application self-protection) which assesses the integrity of the mobile app, and...
A look at a Russian-speaking hacker offering novice cybercriminals a cheap way to conduct ransomware attacks leads the latest edition of the ISMG Security Report. Also, hear U.S. Homeland Secretary John Kelly address the cybersecurity challenges the federal government confronts.
The latest chapter in the nonstop WikiLeaks saga: As U.S. government officials continue to ramp up their anti-WikiLeaks rhetoric, President Donald Trump has reportedly directed federal prosecutors to examine ways in which members of WikiLeaks could be prosecuted.
These disparate technologies often contribute to the already overwhelming alert volume and create process ineffciencies. It leverages a powerful workflow engine enabling a calibrated automation strategy to meet your operational needs.
Download this whitepaper to learn how to unify threat-response tools, tactics and...
The first intelligence-led platform to simplify, integrate, and automate security operations is here.
Download this whitepaper to read how industry-leading visibility and speed of response lowers total cost of security operations..