CyberGRX and Ponemon Institute surveyed 581 IT security and 302 C-suite executives to determine what impact digital transformation is having on cybersecurity and how prepared organizations are to deal with that impact. In some instances, we highlight the differences between IT Security and C-level respondents....
European budget airline EasyJet says it suffered a data breach that exposed 9 million customers' personal details. While no passport details were exposed, the company's ongoing investigation has also found that attackers "accessed" a small number - just 2,208 - of customers' payment card details.
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. But this particular supply chain attack was an attack on a service provider.
Download this case study to learn how to quickly mitigate third-party security risks.
New Exploits and Increased Relevance of Distributed Denial of Service (DDoS) Attacks
The number of DDoS attacks increased 180% in 2019. Are you prepared for 2020? Learn what you need to know from our Security Operations Center (SOC) in order to protect your organization before an attack happens.
Case study: Learn about several companies' experiences using Neustar UltraDDoS Protect
DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability.
Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets.
In this whitepaper learn everything you need to know about cryptomining including:
What it does
How it gets in
How to recognize and prevent it
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
The "human factor" has become a key discussion point in the cyber security community; the humans behind both threats and security have been sorely overlooked. Even the CISO, the conductor at the head of every security team, has been an elusive figure.
Nominet interviewed 400 CISOs and 400 C-Suite executives on the...
Step out of the server room and into the boardroom.
The role of the CISO is evolving dramatically. Today's CISOs need to possess technical skills and business acumen, plus the ability to communicate complex issues to non-technical board members.
This eBook provides practical solutions to help you thrive as a...
As cybercriminals and nation-states take advantage of the COVID-19 pandemic to further their own aims, authorities are calling on victims to report online attacks as quickly as possible to help them better disrupt such activity.
Customers put their trust in companies to deliver on promises of security. The quickest way to lose customers is to betray that confidence, especially when it comes to their personal information.
Hackers understand that, too. They quickly adapt tools and techniques to disrupt that delicate balance. To truly...
Hackers and cybercriminals have reached a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a dramatic increase in attack frequency, complexity and size.
Although these threats constitute a clear and present danger to organizations worldwide, knowledge is power. This Hacker's...
It is hardly surprising that 94% of cyber-threats still originate in email.
Spear phishing, impersonation attacks, and account takeovers in particular remain fruitful avenues of attack for cyber-criminals aiming to infiltrate an organization with ease. Targeted email attacks of this kind, together with the...
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.