Ransomware presents some unique challenges to organizations, regardless of their size, industry or geography. It has very distinct behavior relative to other kinds of malware. For example, it actually tells you that an attack has taken place. From a defender's point of view, being alerted to an attack is far better...
This monthly Security Agenda will highlight some of the most recent additions to our course library. July's edition features Greg Wilshusen on how the Government Accountability Office conducts audits. Other influencers like Robert Villanueva founder of the Cyber Threat Intelligence Division of the U.S. Secret Service,...
The FBI reports that 22,000 businesses worldwide have been victims of Business Email Compromise (BEC), with recent losses exceeding $5B. In virtually every one of these cases, attackers fraudulently extracted funds from financial institutions using advanced social engineering and email deception tactics.
In this...
Digital transformation represents a massive opportunity for your business. But with this opportunity comes risk and increased security threats for IT organizations. Read the eBook to learn how by rethinking your approach to IT security, you can answer this modern security challenge.
VMware and Intel transform...
How will ransomware-as-a-service develop? What IoT exploits await the enterprise?
The view starts with the evolution of malware - both the potency and the low-cost barrier to deploy it, says Dan Schiappa, senior vice president and general manager, Sophos end-user and network security groups. He is specifically...
In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
The Question is WHEN? Here are some sobering facts:
54% of breaches remain undiscovered for months;
60% of an organization's data is stolen within hours of an attack.
So what can you do about it?
Learn how to Control Advanced Malware with More Visibility.
Ransomware has evolved from its early sneaker-net roots, leveraging the Internet and email to spread to different computers. However, it still follows a predictable script, not all that different from the original AIDS Trojan.
In this guide, we'll help you better understand the role that bitcoin plays in ransomware,...
64 percent of threat alerts are not addressed each day, and 52 percent of these alerts are improperly prioritized by systems and must be manually reprioritized. Security pros are overwhelmed by vulnerabilities that could be simple to mitigate, if only they had the right info at the right time.
Download this...
Ransomware can be devastating, but it doesn't have to be. By combining sophisticated analytics with access management, you can protect yourself from ransomware with rapid detection, optimized access controls, and data-driven recovery.
Download this whitepaper to learn:
How to detect and respond to ransomware...
Phishing attacks have seen a meteoric rise in the last year as attackers continue to refine their tactics and share successful attack types. In particular, they've taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks.
Download this...
This monthly Security Agenda will highlight some of the most recent additions to our course library. June's edition features Federal Reserve Bank of Atlanta's Payments Risk Expert, David Lott discussing mobile wallets and emerging fraud. Other industry influencers like US Bank's Mark Gelhardt, Georgia Tech Research...
This session reviews research into Pawn Storm (a.k.a., APT28, Fancy Bear, Strontium, etc.), which exposes the scope and scale of the cyber espionage attacks and the cyber tradecraft of those who wage these attacks. Trend Micro's researchers have observed activity dating back to 2004, with attacks that have been...
The Internet-of-Things poses tremendous cybercrime challenges with crafting a meaningful risk-based financial crime management strategy. In this session, we'll cover the meaning of cybersecurity in the context of fraud and customer trust, an understanding on the meaning and purpose of a cyber threat intelligence...
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.