The annual Infosecurity Europe conference this year returned to London. Here are visual highlights from the event, which featured over 240 sessions and more than 400 exhibitors, 19,500 attendees and keynotes covering data breaches, darknets, new regulations and more.
Yet another warning has been issued about the BlueKeep vulnerability in older versions of Microsoft Windows. The latest comes from the Department of Homeland Security, which tested a remote code execution exploit.
Medical device vendor Becton Dickinson and U.S. federal regulators have issued security alerts about vulnerabilities that potentially put certain infusion pump products from the manufacturer at risk for remote hacker attacks.
Read the Q1 2019 Quarterly Threat Report tto learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.
Key report findings include:
8% of externally-facing IT assets are susceptible of being exploited by a high or critical...
When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities. Another driver, he says, is the sheer interconnectedness of devices - driven by the rise of IoT.
After a two-year absence, the FIN8 hacking group has returned with a new campaign targeting POS machines in the hotel industry with malware in an effort to steal credit card information and other data, according to new research.
A security researcher has posted a demonstration showing how an attacker could exploit the BlueKeep vulnerability to take over a Windows device in a matter of seconds. Meanwhile, the NSA has joined Microsoft in urging users to patch devices before an attacker takes advantage of this vulnerability.
Organizations and their applications are under attack from automated bots and bad actors. And many of these attacks are undetectable by conventional security technologies. How can organizations detect and prevent this activity? Carl Gustas of Cequence Security shares insights.
Ransomware attacks, such as WannaCry and Petya, in which data is encrypted until a ransom is paid, are trending upward. As noted in the 2018 ISTR, although the number of ransomware families has decreased year over year, the number of ransomware variants has increased by 46 percent. This indicates criminal groups may...
One of the most famous security breaches in recent memory, the hack of the US Democratic National Convention email server, was conducted via fileless attack. The hack was comprised of targeted emails from seemingly legitimate sources that contained links to infected web pages, which subsequently allowed hackers to...
Perhaps the most important measure that an organization can take is to shift its perspective on cybersecurity from one that focuses simply on perimeter defenses to one that also limits the dwell time of an attacker
who manages to penetrate its environment. This shift limits the potential damage the attacker can...
As the volume and speed of network data increases, security
tools are unable to keep up, resulting in security tool sprawl,
performance degradation, inefficiencies and unnecessary
expenditures. All of this leads to increased time to threat
detection and response and a higher risk of a breach - despite
Are your threat prevention tools struggling to keep up with the
increasing speed of your organization's network? Is the number
and variety of security tools you think you need starting to tax
your budget and overcomplicate your security infrastructure?
This paper outlines how the GigaSECURE® Security...
It's time to face a hard truth: Modern enterprise networks can be extremely sometimes
painfully complex to manage and defend. Even worse, these behemoths may be
constructed of legacy hardware that can barely keep up with the demands of a modern
workforce. Network speeds to 100Gbps, unfettered access to cloud...