Nearly four years after the WannaCry ransomware hit the world, targeting the EternalBlue vulnerability in Microsoft SMB version 1, security firms say the malware continues to be a top threat detected in the wild by endpoint security products. Why won't WannaCry just die?
It used to be enough to protect the network perimeter, but in recent years, an expanding perimeter has opened the door to threat actors preying on a larger attack surface.
Understanding the evolution of endpoint security and the solutions available to your organization is key to protecting your business in...
The cybersecurity firm McAfee Corp. announced Monday it will sell its enterprise business unit to the private equity firm Symphony Technology Group for $4 billion cash and then focus solely on its consumer business. STG also owns RSA.
Many IoT devices sold today don’t meet minimum security standards, and much effort is being devoted to making IoT devices more secure. IoT expert TJ O'Connor says consumers are largely in the dark when trying to evaluate the security stance of IoT devices.
Supermicro and Pulse Secure have each issued advisories warning users that some of their products are vulnerable to an updated version of Trickbot malware that features a bootkit module, nicknamed Trickboot, which can search for UEFI/BIOS firmware vulnerabilities.
Tanium has been an established player on the North American endpoint protection market for some years, but until recently has had only a limited presence in Europe. That is now changing as the vendor builds out its personnel and partnerships in the region. However, organizational presence is only one part of the...
Digital transformation is a way of life in today’s business world. It touches all corners of the enterprise in ways that were once unimaginable. CIO and IT executives at companies of all sizes and in all industries are quickly coming to realize that most legacy tools and processes are, at best, inefficient and are...
Modern IT teams feel pressure from all directions. They must maintain compliance with data privacy regulations, track and secure sensitive data across endpoints and manage an ever-increasing number of assets, all while enabling business growth. Balancing these priorities often causes significant challenges for many...
Traditional perimeter-based IT security models aren’t well suited for today’s world of cloud services and mobile users. Savvy attackers can breach enterprise networks and fly under the radar for weeks or even months.
Threat actors always find new and innovative ways to penetrate networks, steal data, and disrupt...
This multinational pharmaceutical
company’s supply chain was distributed
across multiple manufacturing plants
and countries. While it had a good
understanding of the number of OT devices
on its networks, it wasn’t able to clearly
see how assets were communicating and
where vulnerabilities and risks...
Fast-evolving advanced threats, increasing volumes of malicious cyber-activity and changing regulatory requirements all mean MSPs face headwinds when transitioning to offer comprehensive and effective security solutions for their clients. But for MSPs that choose an approach suited to their business model, enabling...
The oil and gas industry continues to be an attractive target
for cyber criminals, making it essential for companies to
adopt a more proactive approach to cyber defense.
Download this case study to learn more about:
How combining industry experience with the right technology can help your organization;
Cyberattacks can cause devastating
business disruptions and lead to
financial losses reaching hundreds
of millions of dollars.
The World Economic Forum’s 2020 Global Risk Report ranked
cyberattacks causing disruption to operations and critical infrastructure
among the top five increasing global risks....
In the new world of increased cyber risk, approaches that bridge the
IT/OT divide are no longer optional – they’re mission critical. Executive
leadership expects CIOs and CISOs to anticipate and stay ahead of the
enterprise-wide threat landscape, including oversight of cyber risks
related to industrial...
Digital risk is everyone’s business, from the CEO to the end user. Yet in
many organizations, it’s the IT department that is tasked with managing
and minimizing it.
Gartner predicts that by 2023, 75% of organizations will expand their risk
management programs to address new cyber-physical systems...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.