Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
Each year, hundreds of cybersecurity professionals submit proposals to be a speaker at RSA Conference. And each year, we mine these proposals for trends and commonalities.
In our latest RSAC 2022 Trends eBook, we examine the data from this year’s submissions to provide an interesting glimpse into what will be on...
Take the 5 minute survey now.
From Solar Winds to Kaseya, Accellion, Log4j, or Okta, third-party security breaches can be devastating; impacting security and business operations, reputation, and finances. No matter how good your internal risk prevention and mitigation strategies may be, an unknown, incomplete, dated,...
All organizations rely on vendors and suppliers to power their operations, but working with third parties also means incurring risk. Over the past year, we witnessed mounting scrutiny and penalties tied to regulatory and data privacy requirements; significant third-party breaches that led to customer losses and legal...
Never have global financial institutions
faced such adversaries. The cybercriminal gangs now wield tools that
used to be the province of nation-states, and the nation-states now
engage in activities that once were owned by cybercrime. Scams
and schemes including account
takeover, denial of service and ransomware...
Ever had a magical encounter with search? (Not often enough, right?) One of the easiest ways to improve customer experience is by upgrading site search and website performance. Website searchers convert at twice the rate of other customers and enhanced performance increases customer loyalty and revenue.
In this...
Take the 5 minute survey now.
Defending data is an increasingly complex task today, with the threat landscape expanding into unthought-of devices and communication methods, from IOT to the cloud, all while attackers seek to exploit any new vulnerabilities created. To tackle this dynamic landscape, our detection...
When it comes to API development, it’s not just a matter of testing for security gaps but also when you test your APIs. Only testing prior to deployment can lead to serious vulnerabilities. Discover how developers can build API security into the design with Shift Left API Security Testing, and identify flaws early...
According to a recent survey conducted by Noname Security, 41% of
organizations experienced an API security incident in the last 12 months and
63% of the incidents involved a data breach or data loss. Filip Verloy, technical
evangelist, EMEA at Noname Security, says that “tighter integration of API
security...
The applications of Machine Learning in cybersecurity can make a significant impact on improving detection and reducing false positives, resulting in faster and more efficient security operations. But there is also a lot of noise and hype around this concept.
In this white paper, we approach AI from a realistic...
Les rançongiciels sont rapidement devenus le fléau des entreprises et des organismes publics. Les dommages sont plus coûteux que d'autres types de menaces et les occurrences sont en augmentation sans que l'on puisse en voir la fin. Le Guide ultime de la défense contre les ransomwares énumère les tactiques...
The cybersecurity skills shortage has grown more urgent in recent months amid “The Great Resignation” and growing volumes of phishing, ransomware and email fraud. Unfortunately, throwing more security tools at the problem is only making things worse. Download this e-book to learn how you can save time, reduce risk...
Transform attackers' favorite targets into your best defense
More than ever, attacks seek to exploit human vulnerabilities, not just technical flaws. In most cases, they do it through email. But you can transform every potential victim into a defensive choke point by making email reporting and remediation key parts...
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
A global, integrated oil and gas company operating across five continents is using digital
transformation to grow its business, enter new markets and be more competitive. Critical
to this effort is a cloud-based digitalization initiative to enable advanced analytics and
decision-making, fueling greater efficiency,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.