Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That's the stark conclusion of new data gathered by more than 1,600 FireEye network and email sensors deployed in real-world networks. Following up on our May 2014 report,...
The numbers are staggering. Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they're not responded to quickly, the consequences can be disastrous.
In...
As the technology landscape evolves and attackers continue to adapt, we're going to see new vulnerabilities to mobile, new operating systems and the cloud - and new ways for attackers to exploit these weaknesses.
Download this whitepaper to learn:
Technical predictions for the upcoming year;
Business...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your team fail at responding is to not have them trained with well-practiced procedures and have them be overly reliant on expensive, improperly configured technology. Strike, strike,...
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In this session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real-world deployments and...
Our law enforcement agencies are amassing a deep set of capabilities for investigating and prosecuting cybercrime.
These public-sector organizations, however, need to understand the driving forces, priorities and procedures within the organizations they help protect. Equally as important is that private-sector...
The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data,...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Public sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect", but equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
News reports of a suspected attack against JPMorgan Chase, and perhaps other banks, serve as an important reminder for financial institutions to ramp-up their security efforts, especially to guard against phishing attacks.
The security firm defends service, says it offers a free consumer check against more than 1.2 billion credentials stolen from over 420,000 web and FTP sites, and hashes all checked passwords to keep them secure.
IT security expert Bruce Schneier, now the chief technologist at an incident response provider, sees tools that help enterprises respond to a data breach being used for other unexpected events.
Expect every new warning of cybercrime attacks, online espionage or the malware du jour to be slickly marketed, with the announcements carefully timed. But is this bad for either the information security community or attackers' victims?
A report that Russian hackers have hoarded 1.2 billion stolen passwords could prove to be an important catalyst for beefing up information security. Experts analyze the potential impact.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.