At a recent meeting of hospital CEOs in Texas, the leaders said the issue that keeps them awake at night is cybersecurity, says Fernando Martinez of the Texas Hospital Association, who explains why.
We all know that May 25 was the enforcement deadline for Europe's General Data Protection Regulation. But what impact will General Data Protection Regulation have on cybersecurity programs?
GDPR, or the "Y2K" of our era, is part of a larger conversation that's been catalyzed by a lot of the recent news around...
Choosing the right password solution for your business means defining your unique needs, and finding the product that best delivers on those needs.
Download this whitepaper that gives you an evaluation and comparison on various password solutions such as:
A comprehensive set of criteria for evaluating...
The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to
look at two-factor and multi-factor solutions to accomplish the goal. Clearly, the addition of second and third factors addresses the need. However, in the process, security professionals often...
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter.
Download this report to learn more about:
What the scope and cost of an attack is in various industries;
How organizations are protecting themselves in various industries from...
We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud?
This session describes:
More about blockchain and its uses beyond digital currencies;
The value of...
Despite the buzz about digital transformation, most enterprises remain overwhelmed by having to support and secure legacy technologies, says Mark Loveless of Duo Security. How can they simultaneously protect their legacy systems while securing their future?
Data encryption, advanced authentication, digital signing and other cryptography-based security functions have come to play a vital role in organizations' cybersecurity and regulatory compliance initiatives.
To secure their digital assets effectively, organizations must protect their cryptographic keys, much like...
The attackers behind SamSam ransomware have been focusing not on infecting individuals' computers, but rather the systems of large organizations that they hope will pay for a "volume discount" - in one case, $46,000 - to decrypt all of their systems at once.
Monica Jain has a lot of experience in security operations centers, and she knows much of the tribal knowledge there is not automated or shared. That's why she co-founded LogicHub, a new intelligence automation platform.
Mark Jaffe is less concerned about how adversaries breach networks, but more concerned about how to secure their actual target - critical data. His startup company, Allure Security, intends to help secure that data.
Phishing is one of the most devastating threats hitting organizations every day. It's the most dangerous and costly cyber threat across the globe. Just one successful phishing attempt against your employees provides the foothold that cyber criminals need to access your entire corporate network.
A joint study...
Employees at Mesa Systems, a residential, commercial and logistics-based transportation solutions provider, were being tricked with highly sophisticated spear phishing emails causing much confusion in the workplace and a ton of overhead for the IT Department. So what did they do?
This case study reviews how Mesa...
Phishing attacks continue in 2018 to be very successful, regardless of all of the training employees have received. Threatening every organization around the world, attackers consider phishing a go-to technique to gain access to the network because it yields great success. With limited IT staff, budget constraints and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.