The healthcare and pharmaceutical industry is a target for both criminal and state-sponsored threats.
More large healthcare data breaches were reported in 2020 than in any other year. Additionally, 2021 has seen five consecutive months where industry data breaches have been reported at a rate of two or more per...
Businesses are constantly being bombarded by malicious attack threat vectors that operate through email inboxes/outboxes. Malevolent entities use a wide variety of ever increasingly sophisticated techniques to lure your employees and customers in order to attack your organization through email, while evading detection...
As cloud email security implementations become more popular, security and risk management professionals are taking an in-depth look at their capabilities. Cloud-based security solutions deployed through APIs instead of a gateway are easier to implement and provide more comprehensive protection.
To find out how to...
As the pandemic pushed businesses out of the office and into a hybrid way of working, we’ve come to depend on technologies like email for critical business functions: signing contracts, sharing documents––even just chatting to our team about the game results.
But unfortunately, the more we rely on email, the...
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
Organizations relying on point solutions to manage and secure their devices face a variety of challenges not limited to high expense, siloed processes, lack of visibility into their environments and disjointed operations and security teams.
The Forrester Consulting Total Economic Impact™ (TEI) study...
The year is ending with a cybersecurity bang - not whimper - due to the widespread prevalence of the Apache Log4j vulnerability. Researchers warn that at least 40% of corporate networks have been targeted by attackers seeking to exploit the flaw. More than 250 vendors have already issued security advisories.
For many security teams, it's been all hands on deck since the Apache Log4j zero day vulnerability recently came to light. Experts say the flaw may be the most serious security vulnerability to have emerged in years, and organizations are now racing to identify their exposure and defenses they can deploy.
XDR takes endpoint detection and response to the next level, delivering comprehensive visibility into the entire security ecosystem. Learn how to get the most performance out of XDR, navigate through the noise, and develop a plan to realize proven security capabilities beyond EDR and SIEM with this comprehensive...
Microsoft Security tools such as Microsoft 365 Defender, Microsoft Defender for Endpoint, and Microsoft Sentinel are raising the bar on threat detection, isolation, and mitigation. Learn how to use Managed Detection and Response (MDR) to get the most out of your Microsoft Security Investment.
Download this eBook...
A new ongoing malware campaign is currently being distributed in the wild targeting TP-link wireless routers, leveraging a post-authenticated remote command execution, or RCE, vulnerability, according to FortiGuard Labs researchers.
Hellman Worldwide Logistics, one of the world's biggest logistics and shipping firms, is warning that its operations remain disrupted following an online attack of unspecified nature. The attack comes amid a busy season for e-commerce and shipping, with supply lines already stretched thin, experts say.
While there are many solutions that claim to simplify certificate lifecycle management, not all of
them are built to address the unique complexities of today’s expansive and distributed digital
environments.
When evaluating a certificate management solution, it is important to look for
key capabilities that...
Since Emotet malware returned last month, it's been dropping the Cobalt Strike penetration-testing tool directly onto infected endpoints shortly after infection, researchers say. The move could be a bid to more rapidly identify high-value systems for targeting with ransomware, some experts warn.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.