Ransomware is a rapidly evolving challenge for organizations of all sizes. Although the vast majority of ransomware attacks are spread by email through malicious links or attachments, devices can also be infected through several other vectors, including "driveby" downloads whereby a vulnerable victim system is...
Opportunistic attackers may have breached some Parliament email accounts by brute-force guessing their way into accounts with weak passwords. But such a breach is hardly the "cyberattack" some are making it out to be.
The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
Companies in all sectors are faced with substantial challenges to prepare for GDPR. Regulators and supervisory authorities in charge of data protection wield a number of hefty sticks with which to enforce the new regime under GDPR.
To help your organisation prepare, download this whitepaper and learn:
If GDPR is...
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior. But only 29 percent are very confident in their security controls. Neustar's Tom Pageler analyzes results of Strategic Cybersecurity Investments Study.
In an in-depth interview, David Finn, a member of a task force that advised the Department of Health and Human Services on cybersecurity challenges, describes its recommendations, including the need for a healthcare sector-specific cybersecurity framework.
Security professionals think in terms of risks and threats to ensure that the right security measures are deployed in the right places and to a proper degree. Security teams need an evaluation process to help them determine whether an object is under-protected or over-protected, but traditional security assessment...
Every day, your employees - usually accidentally - create vulnerabilities that create opportunities for data breaches. You must balance risks with giving employees the access they need to succeed. While cloud apps and BYOD policies are known to increase user productivity & lower operating costs, they are also...
Metro Bank is the UK's first new High Street bank in over 100 years. With a focus on the customer, Metro Bank provides unparalleled levels of service and convenience to its customers.
Metro Bank wanted to take employee productivity to the next level by enabling off-network access to Office 365 and Yammer, but found...
Organizations around the world are being targeted by ransomware attacks like never before...
But rather than suffer a data destruction or business disruption incident, many are paying the ransom. That's no solution. It's costly and comes with no guarantees of the safety of your data or systems. Perhaps worst of all,...
A RedSeal-72Point study of 200 CEOs about their perceptions of cybersecurity posture discovered that many are dangerously unrealistic about how vulnerable they are. In fact, more than 80 percent displayed "cyber naiveté," allowing their organizations to be exposed to cyber-attack.
This study reveals the...
Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Read and learn how.
Donaldson, now a Solutions Architect with...
Cyber threats pose a risk to federal agencies accomplishing their designated missions. By following best practices to simplify security intelligence, an agency reduces the burden on its security operations team and allows technology to do the work of surfacing and responding to cybersecurity threats.
Download this...
Organizations are scrambling to identify security weaknesses before their adversaries do. Having a consistent, systematic, and scalable methodology to properly assess your environment is essential. To begin you need a solid understanding of the organization, its components, what it relies on, and what could cause it...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.