The latest edition of the ISMG Security Report analyzes why cyberattacks against banks have surged in recent weeks. Plus: The increasingly ruthless tactics of ransomware gangs; cybersecurity strategies for small businesses.
The identity and access management strategy for the remote workforce should ensure contextual authentication to establish the credentials of the users, apply risk-based authentication for measuring user risk profiles, and establish a multifactor authentication mechanism, a panel of experts says.
Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.
Tamim Ahmed, risk analyst at Bangladesh Government's Computer Incident Response Team or BGD e-Gov CIRT, explains the steps the organization is taking to help secure the nation's critical infrastructure.
Introducing a better category of detection and response tools: XDR. XDR stitches together data from the endpoint, network, and cloud in a robust data lake. Applying advanced machine learning and analytics, it identifies threats and benign events with superior accuracy and gives analysts contextualized information,...
The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn't easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of...
Internet usage around the world is shifting as a result of COVID-19. We are seeing an increase of 10-30% traffic across the board. As companies face a sudden surge in traffic, it is important that they ensure the availability of critical systems that serve their customers and employees.
Join Anand Guruprasad,...
For many organizations, digital transformation arrived over a weekend in March. Now they look ahead and wonder "what next?" re: authentication, privacy and third-party risk. In a webinar preview, RSA CTO Zulfikar Ramzan shares his vision of cybersecurity in 2021.
In a video interview, a panel of experts describes why implementing a "zero trust" architecture for the remote workforce during the COVID-19 pandemic requires redefining access control and security strategies.
Organizations that have shifted to a remote workforce as a result of the COVID-19 pandemic should help in the battle against cybercrime by reporting all security incidents to law enforcement officials for investigation, says Brijesh Singh, inspector general of police, the government of Maharashtra.
The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.
Enterprises globally are suddenly
challenged to support and secure the
largest remote workforce in history.
Michael Goldgof of Barracuda shares
insight on how to scale up this capacity
securely, maximizing existing tools.
Download this eBook to learn more about:
Unique challenges articulated by customers;
Organizations in India need to ramp up their authentication efforts in light of a 40% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud, security experts say.
In trying economic times, it's more important than ever to be able to measure and communicate the effectiveness of one's cybersecurity program. Colin O'Connor, COO of ReliaQuest, offers a new alternative to traditional metrics.