Knowing what’s coming is one thing, but preparing your environment is something else entirely. Utilizing insights from the 2024 Elastic Global Threat Report, this webinar will explore how you can maximize Elastic Security for upcoming threats.
Join us for:
Insights on the MITRE ATT&CK threats detailed in the 2024...
Despite existing email data loss prevention (DLP) controls, the top reported GDPR data breach type is “data emailed to the wrong person.” While rules-based DLP plays a critical role in protecting known sensitive data such as PII, Social Security numbers and payment card data, still there are risks it fails to...
This State of Phish Report gives in-depth regional summaries to explore how local nuances affect user behaviour when it comes to cybersecurity awareness and the importance of phishing protection.
A few APJ highlights in this Report are:
Only 28% of users in South Korea consider security to be their responsibility,...
Two SIEM stalwarts completed a merger Wednesday that their CEO said will bring industry-leading capabilities to customers on-premises and in the cloud. LogRhythm and Exabeam will standardize on the latter's New-Scale cloud SIEM given the market traction it has enjoyed since its October 2022 debut.
Banks lose tens of billions of dollars every year to credit card fraud, bad checks and intentional loan defaults, but the main culprits are not third-party scammers. Most of these crimes are being committed by the bank's customers, making detection and prevention a formidable challenge.
While AI has spurred the growth of authentication controls, it has also enabled voice cloning and video deepfakes to become much more convincing. Fraud fighters are looking at adopting a multifactor authentication system using multimodal biometrics to fight against deepfakes.
Stu Sjouwerman, CEO, KnowBe4, and Tony Pepper, CEO, Egress, discuss KnowBe4's recent acquisition of Egress, how the integration enables advanced threat detection, evolving cybersecurity challenges, such as behavioral-based attacks, and future road map.
Permira has acquired a majority stake in BioCatch at a $1.3 billion valuation, solidifying the company's global expansion plans. The behavioral biometrics company is exploring mergers and acquisitions, aiming to expand into key markets while consolidating its position in online fraud detection.
Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.
User and Entity Behavior Analytics (UEBA) is a proven behavior-based insider risk-detection solution within the security community. However, without cloud computing and its big data handling capabilities, machine learning (ML)-the crux of UEBA-cannot be robustly practiced, making it difficult to take note of normal...
Splunk has executed its second round of layoffs since February, axing 7% of its workforce weeks after Cisco announced plans for a $28 billion acquisition. Splunk will reduce its 8,000-person staff by 7% or approximately 560 positions. Most of the jobs being cut are in the United States.
Two cybersecurity vendors are laying off a sizable chunk of their staff, with Exabeam axing 20% of its workforce and F-Secure cutting up to 70 employees. Exabeam eliminated roughly 134 positions this week, while F-Secure wants to shrink its workforce by nearly 14%.
Malicious insiders and compromised credentials are threats that often go undetected by traditional security tools. User and entity behavior analytics (UEBA) analyzes behavior in organizations’ environments to set a baseline for normal and detect anomalies that indicate real threats in need of investigating.
This...
As organizations continue to rely on digital technologies to store and share sensitive information, the threat of data loss has become a major concern. Traditional Data Loss Protection (DLP) solutions can be effective at fingerprinting and identifying sensitive information, but they often lack the context required to...
A mature cybersecurity program is not necessarily an effective one. And while many companies conflate maturity with efficacy, the CISO knows that when it comes to information security, there is a significant difference between the two.
Most of the time, maturity means there are systematic processes in place that...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.