An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management.
Networks are constantly evolving - and so are their attack surfaces. IT security pros must now contend with digital assets like cloud platforms, application containers, web applications, IoT devices, and industrial control systems. For those in critical infrastructure industries, the stakes are even...
In this report we analyze real-world end-user vulnerability assessment (VA) behavior using a machine learning (ML)
algorithm to identify four distinct strategies, or "styles." These are based on five VA key performance indicators (KPIs)
which correlate to VA maturity characteristics.
This study specifically focuses...
As the modern attack surface rapidly expands, companies must get the basics right. Yet each time a data security breach hits the news, there are reactionary questions are what could have been done to avoid the problem. More often than not these incidents occur because organizations commonly overlook basic security...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. In fact,
the perimeter has mostly disappeared. We are living in a new reality, one crowded with new types of dynamic IT assets.
it's discovering short-lived assets like containers, assessing the state of cloud...
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
HSBC Bank is warning some of its U.S. customers that their personal data was compromised in a breach, although it says it's detected no signs of fraud following the "unauthorized entry." Security experts say the heist has all the hallmarks of a credential-stuffing attack campaign.
Georgia quietly fixed two flaws in its voter registration website that could have exposed personal information. How the secretary of state's office discovered the flaws and reacted suggests it may have erred when making a sensational accusation against the Democrats on the eve of the U.S. midterm elections.
If you're dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you're probably considering some form of software-defined wide area networking
With the variety of constraints that you face, selecting the right SD-WAN solution for...
The traditional WAN is no longer an effective solution for today's
distributed enterprise. Organizations are overcoming significant
security and network issues by moving to SD-WAN. There are
many different SD-WANs on the market today, and IT professionals should
carefully review their options so they are not...
Most organizations are undergoing some form of digital transformation (DX), transforming how they bring products and services to the market - and deliver value to their customers. But DX initiatives bring complexity for network operations teams. With business-critical services distributed across multiple clouds, this...
Over the last five years, cybercrime occurrences have escalated dramatically, taking hold of organizations
worldwide - affecting revenue, productivity, information security, and reputation. In 2017 Cost of
Cybercrime Study, the Ponemon Institute emphasizes that, on average, organizations have paid
$11.7 million USD...
Georgia's Republican gubernatorial candidate has accused the state's Democratic Party of attempting to hack the state's voter registration database. The accusation, from Brian S. Kemp, is complicated by his also being the state's current secretary of state, supervising election infrastructure and security.
Want to better block business email compromise - CEO fraud - attacks outright, as well as be able to spot and respond more quickly to any BEC attacks that get through? Incident responder David Stubley details essential defenses all businesses should put in place now.
Australia's largest defense exporter says it hasn't responded to an extortion attempt after ship design schematics were stolen by a hacker. Austal says the material is neither sensitive nor classified.