Password isn't a four-letter word, but for security leaders it is just as cringe-worthy. Single-factor authentication is putting organizations both large and small at risk of data breaches daily - and two-factor authentication can be just as risky, especially if access codes are delivered via text message. The best...
Encryption is skyrocketing both inside corporate networks and on the public internet - and studies show that more and more attackers are using this trend to hide their activities from your SOC:
70% of malware binaries sampled in the 2018 Annual Cybersecurity Report from Cisco took advantage of encrypted network...
Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the...
Déjà vu basic cybersecurity challenge all over again: With the U.S. government warning that geopolitical tensions could trigger wiper-attack reprisals, security experts review the basic anti-wiper - and anti-ransomware - defenses organizations should already have in place.
In today's environment of distributed IT solutions, hardware security modules (HSMs) - which safeguard a company's encryption keys - are often housed in remote data centers, making HSM management challenging and making it costly to access information about this mission-critical security hardware.
Download this...
Encryption is skyrocketing both inside corporate networks and on the public internet - and studies show that more and more attackers are using this trend to hide their activities from your SOC:
70% of malware binaries sampled in the 2018 Annual Cybersecurity Report from Cisco took advantage of encrypted network...
System Administrators are no loner managing boxes sitting under their desks; Now, they're coding their infrastructure. The new digital users, enforced by the as-a-service business model, leave them facing critical challenges to manage and interconnect increasingly diverse systems, and to ensure scalability and...
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.
The 2019 Global Encryption Trends Study surveyed 5,856 individuals across multiple industry
sectors in 14 countries/regions.
The purpose of this research is to examine how the use
of encryption has evolved over the past 14 years and
the impact of this technology on the security posture
of organizations.
Employee...
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic.
Download this eBook transcript of a recent interview with Kevin Stewart of F5 Networks on SSL visibility and learn...
Vera has partnered with UBM to produce the 2019 State of Encryption Research Report. The survey explores the use of encryption and access controls, to understand how organizations currently use these technologies, and to identify IT and security professionals' top priorities in file security.
Watch this webinar to...
Email is indispensable to financial services. It's also so ubiquitous throughout society that most people take for granted that every email sent will be received almost instantaneously.
This guide shares insights on what is really happening behind the scenes with the industry's most used form of communication, ways...
Almost 70% of organizations are very concerned about the lack of control over files as they travel outside the network.
The 2019 State of Encryption survey report explores the use of encryption and access controls to understand how organizations currently use these technologies, and identifies IT and security...
We secure our organizations like fortresses, building layers of walls around our networks, applications, storage containers,identity and devices. This makes us feel safe. But then one important email attachment accidentally leaves the citadel causing a breach. An unhappy employee moves high-value designs onto a USB...
While Office 365® offers a significant and useful set of productivity, collaboration and other services, it is not the only solution that most organizations will need to satisfy their archiving, data security, encryption, and in particular, their e-discovery requirements.
Download this detailed Osterman Research...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.