As times change, many companies and organizations have worked on ramping up their multi-faceted security defenses. However, threat actors and cyber criminals also adapt and hunt for new vulnerabilities, compromising data by embracing new exploits to ensure substantial financial payoff.
In this report, we...
Banks and mobile network operators should collaborate to mitigate the risks of SIM swap fraud, which can lead to account takeovers, says Clare Messenger, global head of fraud protection at the U.K. telecom firm JT Group Ltd.
NIST has drafted guidelines for how to use its cybersecurity framework to address cyberthreats and other security issues that can target state and local election infrastructure and disrupt voting.
Android device users are being targeted by a sophisticated spyware app that disguises itself as a "system update" application, warns mobile security firm Zimperium. The app can steal data, messages and images and take control of phones.
With the explosion of remote business, we are
now digitizing many of our documents and
processes. Jay Schiavo of Entrust explains what
new mindset this shift requires and shares advice for
organizations currently making the shift.
Download this eBook to learn more about:
What’s needed to ensure document...
Data loss prevention is evolving to meet changing work environments. Mario Espinoza of Palo Alto Networks, details how cost and complexity can be reduced.
In this eBook Espinoza discusses:
Why data is at greater risk now than ever before, and why traditional DLP solutions are inadequate for the task;
How a...
Moving data internally and between partners requires the safest, most secure method to guard against data breaches. That’s even more important in todays “new normal” where the threat landscape has changed where work from home employees face new risks and challenges with your company data.
Organisations have...
Using data classification helps you regain control over your unstructured data. By involving your users in data classification, they will automatically become more data-aware, with a greater understanding of your policies and the value of your organisation’s data.
This whitepaper will take you through the 5 steps...
In this whitepaper, we look at how the threat landscape has changed for businesses, the drivers behind the change – both technical and cultural, and the challenges involved in managing, controlling and protecting data. We then introduce a data-centric approach to security which
involves users themselves in...
Download this whitepaper to know more about paper-based classification policies, automated and user-driven data classification, how to prepare for a data classification project, the peripheral benefits of involving the user in security and more.
Four editors at Information Security Media Group review the latest cybersecurity issues, including Microsoft Exchange server hacks, insider threat management and implementing a "collective defense."
The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.
Criminals continue to target on-premises Microsoft Exchange servers that have not yet been updated with four critical patches, including for a ProxyLogon flaw, which is now being targeted by Black Kingdom ransomware. One expert describes the attack code as being "rudimentary and amateurish" but still a threat.
What's that IoT device on your network? A lot of organizations may not know. That's why Gartner analyst Tim Zimmerman says enterprises need to create IoT security policies and governance rules to reduce risk.
Canadian IoT device manufacturer Sierra Wireless reported Tuesday it had suffered a ransomware attack over the weekend, forcing it to halt production. The attack has disrupted its website and some internal operations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.