This report is based on a Forbes Insights and IBM survey of 353 executives across the globe, which reveals a significant disconnect between how executives view resilience and responsibility when it comes to the gray areas of their expanding technology ecosystems.
Download the report and learn why:
Only 42% of...
Albany, New York, is the latest unit of local government hit with ransomware in recent weeks, following similar attacks reported in Georgia and North Carolina that crippled government IT systems and disrupted service for local residents.
The 2018 Cost of Data Breach Study: Impact of Business Continuity Management (BCM), sponsored by IBM, analyzes the financial and reputational benefits of having a BCM program in advance of a data breach. The purpose of the study is to demonstrate the economic value of BCM when dealing with data breach...
Cyber incident recovery is designed to recover data and platform configurations very quickly in the event of a cyber outage.
Download this brief and learn how cyber incident recovery provides:
Quick detection of anomalies within Windows or Linux system configurations;
Orchestrated restoration of data and platform...
Cyber-resilience is key to data and application availability. It is also a key component of the digital transformation journey. Without proper cyber-resilience, organizations will find themselves susceptible to attacks that can paralyze a business.
Download this white paper and learn about:
Challenges in the...
Life after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able to rapidly respond to the next big cyberattack against Europe. But with warnings of ongoing Russian election interference campaigns, the next big attack may already be underway.
Aluminum giant Norsk Hydro has been hit by LockerGoga ransomware, which was apparently distributed to endpoints by hackers using the company's own Active Directory services against it. To help safeguard others, security experts have called on Hydro to release precise details of how it was hit.
Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period and reportedly led local officials to pay a bitcoin ransom worth $400,000 to restore systems and infrastructure.
A rush by some media outlets to attribute a late-2018 alleged Ryuk ransomware infection at Tribune Publishing to North Korean attackers appears to have been erroneous, as many security experts warned at the time. Rather, cybercrime gangs appear to be using Ryuk, according to researchers at McAfee and Coveware.
Good news for many victims of GandCrab: There's a new, free decryptor available from the No More Ransom portal that will unlock systems that have been crypto-locked by the latest version of the notorious, widespread ransomware. But the ransomware gang appears to already be prepping a new version.
Ransomware victims who opted to pay for the promise of a decryption key forked over an average of $6,733 in the fourth quarter of 2018, according to ransomware incident response firm Coveware. It says strains such as SamSam and Ryuk, which demand higher-than-average ransoms, are increasingly common.
The 2018 Cost of Data Breach Study: Impact of Business Continuity Management (BCM) sponsored by IBM, analyzes the financial and reputational benefits of having a BCM program in advance of a data breach.
According to the research, BCM programs can reduce the per capita cost of data breach, the mean time to identify...
Cyber-resilience combines the best practices from IT security, business continuity, and other disciplines to create a business strategy more in line with the needs and goals of today's digital business.
Download this white paper and learn:
How digital transformation is breaking down the traditional safeguards...
A business disruption caused by cyberattacks corrupting your critical data and configurations of your systems can be as damaging to an organization's financial well-being and reputation as data theft or a complete IT outage.
This can be especially true when cyberattacks involve data encryption or malware...