A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe.
As the financial services industry rapidly changes, and new digital products and services are redefining how consumers interact with their money, there is added network complexity brought on by these new products. Financial networks are increasingly harder to defend, allowing hackers to exploit loopholes in security...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
According to our research, the average total cost of data breach for the 419 companies participating in this research decreased from $4.00 to $3.62 million. The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased from $158 in 2016 to $141 in this...
DDoS extortion comes in many forms. Campaigns over the past three years have varied in their nature and continue to evolve over even the past few months. What lessons can be learned from the latest attacks?
Download this eBook on DDoS and extortion and learn about:
Characteristics of today's prevalent...
DDoS has undergone a serious change in attack strategy. In previous years it was used a means of gaining hacking credibility in the underground, taking out competitors or just disrupting business normality or the industry.
However, a recent string of attacks has not followed convention, and is forcing security...
Transport Layer Security (TLS), if implemented correctly, can ensure that no third party will tamper with a sensitive email message. The Challenge? Mandatory TLS is cumbersome, costly, and time consuming. Opportunistic TLS cannot ensure the sensitive email is actually sent securely. Read more in our e-Book about the...
Today, email is a critical component of any business and must be protected with proper security. Microsoft has become the vendor of choice for email, but many customers find the security capabilities provided do not meet their full requirements. Zix provides a broad portfolio of email security solutions that can be...
Not all email encryption solutions are created equal. Modern email encryption solutions balance security with ease-of-use eliminating barriers that would cause senders and recipients to jump through hoops.
Download this eBook to learn more about:
Consequences of difficult to use email encryption...
Email is the most used communication tool in the business and the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can be an easy way to secure sensitive corporate data, avoid breach costs and meet regulatory obligations.
Download this eBook to discover:
The...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
On May 25, 2018, all organizations that do business with citizens from the European Union will be subject to the enforcement of a new set of laws that help protect their sensitive personal identification information. Called the General Data Protection Regulation (GDPR), the legislation replaces a two-decade-old EU...
The front lines for conflict in the digital age now lay at the network gateway. Unfortunately, on today's virtual battlefield, the enemy is constantly advancing. While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world...
With business networks already supporting an array of mobile devices and remote workers - often on a global scale - many IT executives expect their bandwidth demands to only accelerate, surpassing 10 Gbps by 2020.
Download this report for key findings such as:
Despite the growth in cloud-based solutions, most...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.