The definition of "machine" is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly throughout Europe and the UK, but this is outstripped by the number of applications and services they host.
At the same time, cloud adoption has spawned a tidal wave of...
Even though SSH keys are the credentials that provide the most privileged access in an organisation (including root-level privileges), they are routinely untracked, unmanaged and unmonitored. This guide provides four steps to protect and take control of your SSH keys to minimise your risk of intrusion.
Download this...
A recently published survey of more than 400 security professionals in the UK, Germany and the US measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...
You know that your organisation is using SSH to safeguard privileged access, but you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a recent study show that most organisations don't have the SSH visibility or security...
What are the latest trends in BEC attacks? Does your organization have the security controls and resources in place to defend against them?
Download this report featuring exclusive BEC research and learn:
Which malicious emails bypass traditional email security protocols;
What a typical organization sending BEC...
Endpoints cluttered with resource-hogging agents hinder productivity to the point where frustrated end users take matters into their own hands by uninstalling antivirus, leaving their device vulnerable to even the most common malware.
This situation won't be fixed with legacy products and the outdated architecture...
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business. With security threats emerging faster than ever, what information is most important to protect? What happens if it's not protected? What strategic business...
Security alert: Microsoft has issued updates to fix 67 unique flaws in its products. One vulnerability in Windows VBScript engine is already being actively exploited in the wild via malicious Word documents and could also be employed for attacks via websites and malvertising, Microsoft warns.
Incident response plans must be carefully designed to meet the needs of a specific organization, says attorney Ron Raether, who outlines important legal considerations.
A coherent risk analysis program tailored to the organization is a vital component of any effort to improve cybersecurity and meet regulatory requirements, says attorney Shawn Tuma.
Spectre and Meltdown: It's déjà vu all over again as Intel is reportedly prepping a coordinated vulnerability disclosure announcement for eight new speculative execution flaws. One of the new flaws is apparently worse than any of the three Spectre/Meltdown variants that came to light in January.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
Equifax says it continues to field queries from U.S. lawmakers about the full extent of its massive 2017 data breach, which occurred after an attacker exploited its unpatched Apache Struts web application. Research finds that many more organizations are using unpatched Struts applications.
The security industry is heavily reliant on old models that are breaking down, and trying to contort old tools to meet the needs of the new hybrid environment is difficult, says Leo Taddeo of Cyxtera.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.