Government and defence are facing an unprecedented threat from cyber-attack. In the communication infrastructure, files or documents are an essential tool for citizen-to-government and real-time information sharing between networks of varying security classifications and enclaves.
Weaponised files embedded with...
The 2018 State of the Phish Report presents analysis of data from tens of millions of simulated phishing attacks sent through our Security Education Platform. The report captures and delivers the types of data infosec professionals are seeking as they develop their own security awareness training programs. These...
Today's most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This report is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider...
Managing user access has been a top-of-mind concern for IT and security experts for years, but the realities of today's
application economy have recently made it a more urgent and challenging topic to address. This is especially true for customer- and partner-accessed applications, because the proliferation of mobile...
Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door
for fraudsters. According to recent reports, cybercriminals have expanded their reach beyond traditional targets of consumer banking and credit cards. They are now looking to harvest valuable data that is...
Distributed deception technology does not provide a viable solution for defending ATM machines against attacks executed physically on the machines themselves. But it is arguably the most effective means of stopping the most damaging attacks - the ones executed against the larger ATM network or those enabled by...
Yesterday's threat detection is not working. Companies must reshape their cybersecurity programs, knowing that attackers are always looking for a way in - or may have already penetrated.
There are numerous ways healthcare organizations can benefit from a deception approach as new cyber vulnerabilities and risks in...
Cyber security awareness is growing as more businesses learn that their networks are vulnerable to an attack. The emerging consensus is that the IT department alone cannot handle security; all employees, especially C-level executives, have a part to play.
In fact, executives are responsible for not only the security...
Today's cyber landscape has become a matter of 'when' not 'if' a cyber breach will affect your organisation.
In this environment, running a successful organisation requires mature cyber incident response capabilities that lead to strong organisational defense and mitigation of harmful breaches. C-suite understanding...
In many instances, we learn that companies have an incident response plan that looks good on paper but not in practice. The plan cannot just live in a manual that sits on a shelf. It needs to be a strategy that everyone agrees to, can evolve over time, is rehearsed often and can be carried out immediately when the...
In this report, we explore some longer-term trends, many of which have evolved. We look at organisations that have been targeted or re-compromised after remediating a previous attack.
We also examine the widening cyber security skills gap and the rising demand for skilled personnel capable of meeting the challenges...
When it comes to detecting compromises, organisations appear to be getting better at discovering breaches internally, as opposed to being notified by law enforcement or some other outside source.
This is important because the data in this report shows that incidents identified internally tend to have a much shorter...
Every security organisation endeavors to shift from a reactive state of constant busy work towards a state of proactive security.
This whitepaper reviews how organisations can work towards this proactive state by integrating the entire security operations lifecycle, from assessing, preparing for, detecting,...
There are massive amounts of vulnerabilities that companies deal with on an ongoing basis - not everything is lost though. Organizations that use unpatched software face a race against the clock, with attackers regularly beginning to hammer new vulnerabilities just hours after new fixes or security alerts get released...
With the changing shift in fraud these days, a fraud risk manager really needs to look at the landscape holistically, from the perspective of the customer, with regards to fraud losses and operational expenses. The task then falls on these managers to address these challenges in a way that provides a frictionless...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.