According to the Ponemon Institute, the average total cost of a data breach for the companies affected increased 23 percent over the past two years to $3.79 million. Attacks have even led to CEOs of some breached companies losing their positions. It is often said of cybersecurity, "It's not if you will be breached....
In addition to being able to respond operationally and technically to a breach, organizations must also understand and be prepared for all the legal aspects of response. Savvy organizations must be knowledgeable about response and notification processes and understand the how, what and why of law enforcement and...
Cybersecurity horror stories are a steady drumbeat in the news today. There are many fraud detection, risk mitigation and breach prevention challenges keeping Infosec professionals up at night: rising ransomware demands; serious and expensive breaches at a wide range of organizations and the news of the SWIFT-related...
A hacker is reportedly selling on the dark web copies of databases stolen from three unidentified U.S. healthcare organizations and one unnamed health insurer containing data on millions of patients. Why are such postings becoming more common, and what can organizations do to avoid becoming the next victim?
In an in-depth interview, Michael Sentonas of breach response specialist CrowdStrike discusses how a focus on malware detection may still be leaving organizations exposed and describes the firm's new efforts in the Asia-Pacific region.
The U.S. Securities and Exchange Commission has obtained an emergency court order to freeze the assets of U.K. citizen Idris Dayo Mustapha, who it accuses of hacking into individuals' brokerage accounts to engineer and profit from stock price fluctuations.
Kaspersky Lab says that its original estimate of how many remote desktop protocol server credentials were offered for sale in the now shuttered online cybercrime marketplace xDedic may have been far too low, based on new data coming to light.
Following the SWIFT-focused hack attacks, a U.S. government watchdog agency is auditing the Federal Reserve's effectiveness when it comes to ensuring that U.S. banks have robust information security and data breach prevention programs in place.
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.
The information security community's ability to respond to threats and vulnerability discovery improves with each passing month. However, attackers are also keeping up, or even exceeding the security world's defenses.One way to balance this problem is to not only focus on identifying the threat, but also to find an...
Fraud is a relentless threat to financial services organizations that offer online banking. To effectively combat the perils of fraud, organizations that offer financial services over the internet must defend their businesses with a combination of security technologies. The F5 Web Fraud Protection solution provides...
An experimental investment fund based on the digital currency ether has been hacked, with about $55 million worth of the currency stolen, according to news reports.
Crisis management expert Emily Mossburg discusses a new Deloitte study that shows why many organizations must reassess their approach to breach response to focus on what really matters: keeping the organization functioning.
The attacker's landscape has changed yet again. What was once an era of advanced attackers seeking to gain access into an environment has been transformed by attackers who quickly smash and grab global hotel chains, for example, to pilfer millions of credit card numbers.
Download this whitepaper to explore the...
Preparing for data breaches - to detect them quickly, respond appropriately and ascertain exactly what happened - can help make the difference between a security incident having major or minor repercussions, says CrowdStrike CEO George Kurtz.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.