Advanced malware avoids being detected and can remain hidden for extended periods of time as it conducts complex and damaging cyberattacks. This sophisticated malware is usually designed to aggressively target anything and everything that can be monetized. How can organizations safeguard their data from these...
A recent survey of more than 300 CIOs and CISOs found that digital transformation is forcing them to rethink their cybersecurity strategies. Executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today's continually changing business...
Competing priorities and lack of integration between security and operations teams creates gaps in the security posture that leave businesses susceptible to increased risk and cyber attacks - commonly known as the SecOps gap. Businesses must align the priorities of the security and operations teams to reduce risk and...
The goal of secure operations automation is to improve processes and technology to unite IT Security and IT Operations teams with more focus on collaboration and visibility while allowing the IT Operations team to take a more active role in IT Security.
This report surveyed 318 participants from both technology and...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
Cybersecurity startup Tanium failed to anonymize network data for a California hospital that appeared in live product demonstrations and online videos. It's the second crisis in a week for Tanium, whose CEO has been accused of unsavory behavior and the questionable sacking of senior executives.
Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2017 State of IBM i Security Study analyzed 332 servers.
Now in its 14th year, the study provides compelling insight into security weaknesses affecting many IBM i systems. Some of the most dangerous defects...
Intercontinental Hotels Group says that in addition to 12 hotels that it directly manages suffering a point-of-sale malware outbreak that began in 2016, 1,200 IHG-branded franchise hotel locations in the United States were also affected.
To shift from reactive to active defense mode, organizations need to get better at both threat-hunting and incident response. Tim Bandos of Digital Guardian discusses the tools and skills that are needed.
Luxury clothing retailer Neiman Marcus has disclosed that a December 2015 breach compromised more sensitive information than first thought. It also disclosed a fresh attack in January that exposed names, contact information, email addresses and purchase histories.
A report from Editorial Director Tom Field on why organizations struggle with privileged access management leads the latest edition of the ISMG Security Report. Also, did the NSA target SWIFT bureaus?
Businesses that fail to block former employees' server access or spot any other unauthorized access are asking for trouble. While the vast majority of ex-employees will behave scrupulously, why leave such matters to chance?
IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. New research evaluates DLP products for these three use cases, based on nine critical...
Bryce Austin, a former technology lead at Target during the retailer's massive November 2013 breach, says the role of the CISO needs to evolve, ensuring that cybersecurity is balanced with the overall needs of the company. He claims tying the CISO's performance to the company's revenue is the best way to do that.
New documents dumped online by the Shadow Brokers group have revealed apparent NSA programs designed to target SWIFT service bureaus in the Middle East as well as a slew of exploits designed to infect Windows systems, patched last month by Microsoft.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.