Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organisation's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable.
So once you have that intelligence in hand, how do you enforce it at...
There's good reason that's an increasingly common battle cry among cyber security professionals: Fresh digital security threats continually emerge from new and unexpected sources. Just consider the sudden spread of viruses like WannaCry and Petya/NotPetya, the expansion of ransomware threats, the growth in coinmining...
Attackers are in a constant race to update and refine their approach to stay a step ahead of cybersecurity
professionals. Recently, cybercriminals have adjusted the delivery mechanism of their "payload" away from
traditional attack methods. Most often, security breaches are associated with a malicious executable...
Historically, the most damaging breaches occur months or even years before the organization realizes it. By the time the breach is discovered, enormous financial and subsequent reputational loses have accrued. In 2018, a major hotel chain reported a customer data breach where attackers had been mining information...
With cyberattacks, online espionage and data breaches happening at a seemingly nonstop pace, Western intelligence agencies are bringing many of their capabilities out of the shadows to help businesses and individuals better safeguard themselves and respond. We need all the help we can get.
You can't stop cyberattacks from happening altogether, but you can take proactive measures to better weather the storm and reduce the risk of damage. Among the keys to surviving a cyberattack is mitigating risk on the assets and the network layer. That includes knowing what and where your data resides in the network...
In the past, the relationship between cybersecurity and
privacy has been uneasy and even ill-defined. But today,
in the post-GDPR era, the relationship is clear, and so is
the legal and compliance path forward,
Download this whitepaper to learn more about:
The relationship between security & privacy;
How...
The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk.
The 7th annual Microsoft Vulnerabilities Report for 2020 analyzes the data from security bullitens issued by Microsoft throughout 2019. Every Tuesday, Microsoft releases fixes for all vulnerabilities affecting Microsoft products, and this report compiles these releases into a year-long overview, creating a holistic...
Every day needs to be password security day - attackers certainly aren't dormant the other 364 days of the year. But as World Password Day rolls around again, there's cause for celebration as Microsoft finally stops recommending periodic password changes.
Citrix says the data breach it first disclosed in early March appears to have persisted for six months before it was discovered and the hackers were ejected. In an ironic twist, the company sells the very products that might have blocked recent credential stuffing and password spraying attacks against it.
Cybercriminals have stolen customer data from Citycomp, a German IT company whose clients include Oracle, Volkswagen, Airbus, Ericsson, Toshiba British Telecom and many others. After Citycomp didn't pay a ransom, the hackers posted the data online.
Russian national Anton P. Bogdanov has been charged with stealing more than $1.5 million from the Internal Revenue Service via a tax return fraud scheme. He was arrested last November while on vacation in Thailand, at U.S. request, and subsequently extradited.
Do you know how attackers can move once they're inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals...
How well-equipped is your organization to stop malicious attackers once they're inside your network. According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.