This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.
While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were...
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but also grounded...
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
Through the adoption and implementation of a robust vulnerability and
remediation management system, an organization can make continual
improvements to the security posture of its systems, ensuring the on-going
security of its critical business processes.
An effective system involves the implementation of...
Measuring the effectiveness of the incident response plan
poses a challenge to enterprises and sometimes is only
looked at after an incident happens.
Download this whitepaper which provides an insight on how to assess the effectiveness
of an incident response plan, based on our experience in mitigating...
The convergence of IoT and OT provides a unique opportunity for
a stronger and more resilient infrastructure, whilst
increasing flexibility and responsiveness to new situations.
This needs to be well-managed to ensure the systems are
robust and the risks fully managed, and to maintain an
equivalent level of...
Malicious cyber actors seek to exploit
the increased reliance associated with Covid-19 with related
malware and phishing attacks increasing hugely in
Even more worryingly, hospitals in Spain have been targeted
with coronavirus-themed phishing lures by attackers looking
to disable their systems with...
Giving the right user secure access to a system, resource, application, or network hinges on one thing – accurately confirming the user’s identity. The problem is that attackers can steal and misuse these credentials for malicious purposes, and the organization would never know.
To protect against...
Protecting Active Directory has become increasingly complex with pervasive access and a multitude of objects with varying levels of privilege and domain control. Monitoring and keeping this environment secure has become a significant challenge and comes with dire consequences when that control is lost to an attacker....
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
Warning to workers: Your productivity tools may also be tracking your workplace productivity, and your bosses may not even know it. But as more workplace surveillance capabilities appear, legal experts warn that organizations must ensure their tools do not violate employees' privacy rights.
Japanese computer game company Capcom acknowledged this week that a November security incident was a Ragnar Locker ransomware attack that resulted in about 350,000 customer and company records, including sales and shareholder data, potentially being compromised.
The U.K. NCSC responded to over 700 cyber incidents over a 12-month period, 200 of which were related to the COVID-19 pandemic, according to the cyber agency's annual report. NCSC also notes that's it's preparing to step-up its response to cyber incidents involving the NHS and vaccine development.