Many security leaders argue over whether their incident response posture needs to be proactive or reactive. But Rsam CISO Bryan Timmerman says it isn't either or - that organizations need both. Here's why.
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Too many businesses assume that the internet will be around forever, but that's faulty thinking and an impractical business practice, says Information Security Forum's Steve Durbin, a featured speaker at Information Security Media Group's Fraud and Breach Prevention Summit in Atlanta this month.
As challenging as ransomware has proven to be against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge at detecting malware. Lastline's Engin Kirda explains how.
"Ransomware is a threat that needs to be taken seriously," says Kirda, cofounder and chief...
Despite significant investments in the signature-based defenses of today's network, email and endpoint security solutions, since 2010, these solutions have been ineffective against the sheer volume of evolving malware. Security and risk professionals have turned to automated malware analysis (AMA) for help. These...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.