It difficult to decide whether to replace or to augment existing endpoint protection (EPP) because it is difficult to assess advanced endpoint protection (AEP) products as measuring some of their features can be complicated.
AEP products are promising a new standard in endpoint security, but when should...
Healthcare organizations need to consider a number of legal issues when it comes to cybersecurity incidents involving medical devices, attorney Thomas Barnard explains in an in-depth interview.
As digital threats grow more numerous and perpetrators become savvier, you can't defend your network by taking the traditional, physical approach to IT security. Standard perimeter firewalls aren't designed to protect your critical workloads once an attack makes it inside the data center, and the "firewall-everything"...
Traditional approaches to securing data centers have focused on strong perimeter defenses to keep threats outside the network. Once attackers are inside, it's difficult to stop them.
Download this infographic and learn how to:
Divide the data center into distinct security segments;
Transform your data center with...
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Why micro-segmentation...
Ransomware is a rapidly evolving challenge for organizations of all sizes. Despite expert protection technologies and staff, attackers are consistently changing techniques and developing bolder strategies that creep through vulnerabilities. Although the majority of ransomware attacks are spread by email through...
The European Union's General Data Protection Regulation has been the buzz of 2017, and security leaders globally understand the regulation's basics, including the 72-hour breach reporting mandate, the May 2018 enforcement date and the noncompliance penalty of up to 4 percent of annual global revenue or 20 million...
Will the Equifax breach be a game changer, or just another big-name security mishap that slowly fades away out of collective memory? Does this massive breach have the potential to be the incident that leads to sweeping regulatory changes, when it comes to credit bureaus and data collectors like Equifax? If so, what...
For just $80 per day, would-be cybercrime entrepreneurs can subscribe to Disdain, a new exploit kit that targets now-patched flaws in browsers and plug-ins, including Flash and WebEx. Disdain's debut shows that while exploit kits may have declined, they haven't died out.
How could the private sector benefit from steps federal agencies are taking to improve the cybersecurity of the internet of things and medical devices? In an in-depth interview, two experts at UL who are working closely with the agencies explain the potential impact.
How have major Canadian data breaches helped to shape incident response plans and data security at the organizational level? In this session, Imran Ahmad, an attorney who leads the cybersecurity practice at Miller Thomson and wrote the book, "Cybersecurity in Canada: A Guide to Best Practices, Planning and...
Healthcare organizations can learn important lessons - including the need for granular data access control - from the costly proposed settlement of the breach lawsuit against health insurer Anthem, says Bill Fox, a former federal prosecutor.
It can be incredibly disruptive and time-consuming to add new security technologies to your network. However, it is vital to continue to advance your organization's ability to detect and respond to advanced malware - especially malware that evades other "advanced" security tools like sandboxes and...
Leading the latest edition of the ISMG Security Report: An interview with the head of a new cyber initiative to help political campaigns and local, state and federal election officials safeguard America's electoral process. Also, analyzing the evolving characteristics of the healthcare breach.
This monthly Security Agenda will highlight some of the most recent additions to our course library. July's edition features Greg Wilshusen on how the Government Accountability Office conducts audits. Other influencers like Robert Villanueva founder of the Cyber Threat Intelligence Division of the U.S. Secret Service,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.