The business of crimeware is evolving - and so are the exploits that take advantage of unprotected systems. How do security leaders focus on managing their most critical vulnerabilities? Gidi Cohen, CEO of Skybox Security, shares insight.
The FBI says reported losses due to internet crime last year totaled $1.3 billion, based on nearly 300,000 complaints logged with its Internet Complaint Center. It warns that CEO fraud, ransomware, tech-support fraud and extortion are becoming increasingly prevalent.
The challenges presented by the Internet of Things (IoT) evolution are not dissimilar to those that were posed by the Bring Your Own Device (BYOD) phenomenon as it took hold. But what will it take for organisations to maximize returns from this technology, while mitigating risks?
Download this whitepaper and learn...
The General Data Protection Regulation (GDPR) is set to come into effect in May 2018. Every business, government, and public sector entity that touches European Union residents' data will need to rethink their data management approaches in order to stay compliant and thereby avoid massive new fines and bad publicity....
As more and more sensitive data passes through and resides on mobile endpoints, unique security challenges are created for enterprises.
To ensure your organisation is secure, what are the top threats that you must prepare to face?
Download this checklist of the top ten mobile threats, and learn how you can...
Enterprises that develop a mobile strategy and implement the right solution can expect significant benefits, as can those that update their existing strategy to keep pace with the evolving enterprise mobility landscape. Mobility is a journey, and to begin, it's useful to understand where your organisation falls on the...
Good news: Exploits kits are in decline, thanks to concerted efforts to disrupt their efficacy. Unfortunately, criminals are diversifying their attacks, focusing more on social engineering - including tech-support scams - and malicious spam campaigns.
Microsoft has sought to get in front of a brewing controversy over whether it unfairly disables third-party anti-virus products in Windows 10. The company is seeking to dampen charges that are reminiscent of its years-long legal tangles with global antitrust regulators.
One month after the SMB-targeting WannaCry worm outbreak began spreading globally, Honda discovered fresh infections at multiple facilities, and was forced to temporarily idle one plant as a result of the ransomware.
South Korean web hosting firm Nayana has agreed to pay attackers a record-shattering $1 million to unlock 153 Linux servers crypto-locked by ransomware. Security researchers say the infection was likely exacerbated by the company running ancient versions of the Linux kernel, as well as Apache and PHP.
Writing the obituary for the lifeless Neutrino exploit kit leads the latest edition of the ISMG Security Report. Also, judging the value of the Department of Health and Human Services' wall-of-shame website of healthcare sector breaches.
A new dump from WikiLeaks has revealed an apparent CIA project - code named "CherryBlossom" - that since 2007 has used customized, Linux-based firmware covertly installed on business and home routers to monitor internet traffic and exploit targets' devices.
Britain's security services have reportedly concluded that the WannaCry ransomware outbreak was launched by Lazarus group, a hacking team tied to North Korea. Attribution aside, security experts question how many organizations can defend themselves against Lazarus attacks.