High-profile attacks and unprecedented cyber activity over the past several months have elevated the criticality of threat visibility for security teams and raised the value of integrating threat intelligence into security operations. Taming the volume and complexity of attacks requires a structured approach to make...
Recent ransomware and phishing attacks have heightened the need for identity security for insurance companies who own financial information, social security numbers and health data for their customers. In today’s digital world, insurance companies must get identity right, and getting it right means ensuring that...
Today's IT and security professionals manage distributed endpoints while supporting digital transformation initiatives, cloud migrations and a distributed workforce. Needless to say, they're stretched thin.
It's time to re-evaluate one's approach to endpoint security, but there's a lot of noise in the market. Cut...
The Google-Mandiant marriage will combine Google's security monitoring tools with Mandiant's threat intel and attack surface management solutions, plus new SOAR and file and URL analyzer capabilities, to create an "end-to-end threat intelligence and cybersecurity operations suite."
Hackers have appropriated a red-teaming tool to hack their way into organizations, warns the Department of Health and Human Services. Tens of thousands of organizations each year are affected by a hack involving Cobalt Strike. But companies can spot the tool and should act quickly if they do.
The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.
A compromise assessment answers the all-important question: Have you been breached? Even the most secure organizations routinely commission such assessments because attacks evolve, and corporate security cannot always keep up.
Download this whitepaper to learn more about:
Lifecycle of a targeted attack;
...
It’s estimated that 300,000 new pieces of malware are created and an average of 30,000 websites are hacked every day, a speed that makes it very challenging for security systems to recognize the newest threats.
By examining trends in ransomware targets, it is becoming clear that some threat actors are motivated...
Ransomware actors have intensified their attack campaigns by threatening critical infrastructure shutdowns, risking public health and safety, diverting vital public resources, and impacting data privacy.
Early detection of the intrusion allows an organization to accelerate their response, minimize the impact of...
Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor. The hackers are believed to be at large, likely in China.
As budgets tighten in anticipation of economic hardships, cybersecurity threats only continue to grow. Bill Bernard, CISSP of Deepwatch, advises security leaders to consider how senior management and the board view cybersecurity and then adjust how you prioritize people, technology and managed services.
In this...
The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.
CrowdStrike has purchased external attack surface management startup Reposify to help organizations detect and eliminate risk from vulnerable and unknown assets. This deal will allow CrowdStrike to combine its insights on endpoints and IT environments with Reposify's internet-scanning capabilities.
The Defender’s Advantage Cyber Snapshot offers insights into cyber defense topics of growing importance based on Mandiant frontline observations and real-world experiences. To no surprise, 25.81% of the data repositories and data leak issues observed were on exposed version control repositories.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.