Since the EU's new GDPR privacy law came into effect in May 2018, one challenge for organizations that suffer a breach is knowing whether or not they must report it to authorities, says Brian Honan, president and CEO of BH Consulting in Dublin.
Life after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able to rapidly respond to the next big cyberattack against Europe. But with warnings of ongoing Russian election interference campaigns, the next big attack may already be underway.
The latest edition of the ISMG Security Report discusses the recent ransomware attack on aluminum giant, Norsk Hydro. Plus, confessions of a former LulzSec and Anonymous hacktivist, and the growing problem of cyber extortion.
Forget inside/outside the perimeter when mitigating
risks. That's the notion behind "zero trust," which means
applying risk-based controls to safeguard access.
Download this whitepaper to learn more about:
Cloud service attack trends;
Best practices for mitigating risks;
How to make the concept of "zero trust"...
Script-based payment card malware continues its successful run, impacting a range of e-commerce sites, security researchers warn. With fraudsters continuing to refine their tactics, countering card-sniffing scripts continues to be difficult.
Aluminum giant Norsk Hydro has been hit by LockerGoga ransomware, which was apparently distributed to endpoints by hackers using the company's own Active Directory services against it. To help safeguard others, security experts have called on Hydro to release precise details of how it was hit.
In today's hyper-connected enterprise, organizations are at risk of two different types of attack. Larry Link, CEO of Cequence Security, explains how to defend at a platform level - without adding friction.
An unprotected database belonging to Chinese e-commerce site Gearbest exposed 1.5 million customer records, including payment information, email addresses and other personal data for customers worldwide, white hat hackers discovered.
Is your security team blind to the activities in more than half of its IT assets? That was just one of the findings in a new report from 451 Research, based on in-depth interviews with security leaders across 150 large enterprises and focused on the challenges facing their teams. On average, the report found SIEMs...
With 96% of businesses now relying on cloud computing,
including 81% that use multiple cloud environments*, cloud
adoption is no longer a trend but the new normal.
This requires enterprises to place more emphasis on a critical
issue related to cloud computing and storage: how to ensure the
The problem: growing adoption of interconnected technologies is stretching capabilities of existing public key infrasructures (PKIs) and driving the need to stand-up new ones.
The challenge here is maintaining a strong root of trust across the enterprise PKI that fulfills the operational demands of more...
Email fraud and phishing continue to be an effective attack vendor as they are relatively inexpensive and take advantage of the weakest link in your security program: your users. Combatting these attacks is slow and labor intensive as security analysts typically spend hours trying to determine if an email and its...
Carbon Black and Optiv have released their 2019 Modern Bank Heists report, which unveils the latest cyber threats to global banking institutions. Report co-author Tom Kellermann discusses the findings and what they mean.