Cybercriminals have become dangerously savvy at leveraging the seismic technology changes occurring in the healthcare sector in order to get their hands on sensitive patient data. Medical records are more lucrative for attackers than almost any other targeted information, leaving the healthcare industry in the...
FireEye CEO Kevin Mandia has blamed his company's lower-than-expected quarterly revenue on the rise of ransomware and cyber extortion attacks and a decline in APT campaigns. Experts debunk those assertions.
This threat report explains the vulnerability behind the DHS US-Cert Alert for SAP, as well as how to mitigate it.
Download this white paper to better understand...
How to determine if your SAP systems are vulnerable
How to protect your SAP systems from real-world cyber attacks
Obviously, ransomware attackers have no scruples. But the latest attacks go to even further extremes, channeling everything from Hitler to cats, as attackers hone their attempts to shake down Windows and Android users alike.
The UAE has amended its federal law against using fraudulent VPNs. Anyone using one will be fined and possibly imprisoned. Security leaders welcome the move, saying it is a positive step to help combat cybercrime.
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest ISMG Security Report.
Do you have $100,000 burning a hole in your pocket and an abiding love of bitcoins? If so, then the U.S. Marshals Service has an offer you can't refuse: Bid on bitcoins seized in some high-profile investigations, including the Silk Road takedown.
Every year, record levels of money are spent on new IT security technology - yet major breaches and compromises are more prevalent than ever. The concept of "layered security" - in which an organization supports a wide variety of security technologies in order to discourage attackers - doesn't seem to be working. It's...
A report calling for the United States electoral systems to be designated as critical infrastructure to enhance information security and integrity leads this episode of the ISMG Security Report.
It's a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations' websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets...
As the challenge of battling fraud and preventing breaches grows ever more complex, the necessity of Infosec professionals to build a close working relationship with law enforcement is well known. But how can you make sure this relationship works well for both parties?
In this session, you'll hear the unique...
In a fast changing world, financial institutions are increasingly at the mercy of smart assaults on their ATM networks. Vigilance is no longer enough to defend against ATM fraud. Breaches are inevitable as hackers develop new methods for exploiting ATM security vulnerabilities. In order to win, security tech needs a...
In addition to being able to respond operationally and technically to a breach, organizations must also understand and be prepared for all the legal aspects of response. Savvy organizations must be knowledgeable about response and notification processes and understand the how, what and why of law enforcement and...
Every mature enterprise understands the necessity of a maintaining a tested breach-response plan. But it's critical that the scope of this plan covers all interested parties, not just technical operations, such as legal, finance and media relations that may have greatly different priorities at crunch time.
In this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.