Key gaps in how healthcare entities defend against cybercrime hacking have emerged. Even organizations strictly adherent to HIPAA, NIST or other regulators are still unaware of how their practices compare to their industry peers and whether or not they are lagging behind.
Has your organization assessed and mitigated...
Defending against tomorrow's mobile attacks is a moving target; but new technologies and strategies, including behavioral biometrics and machine-learning-based analytics, are allowing financial institutions to reduce their fraud losses while enhancing their customer experience.
Based on the latest results of ISMG's...
A discussion with ISMG Security and Technology Editor Jeremy Kirk about his chat with the cyber gang "The Dark Overlord," which threatened some U.S. school districts with extortion, leads the latest edition of the ISMG Security Report. Also, an update on surging IT security employment.
Artificial Intelligence (AI) and machine learning are among the top industry buzzwords of the year. But how can AI truly make a significant impact on organizations' cybersecurity operations?
Download this eBook that discusses:
The value and limits of traditional AI
Why and how the human element is critical to...
Is the European GDPR going to change your data security strategy?
Organizations around the world that serve customers and individuals in the EU will be required to put in place security policies to address different risks and effectively enforce these policies with technical controls - or potentially face fines of...
Organizations can no longer rely simply on signature-based scanning of machines to identify malware. Polymorphic malware takes on an infinite number of forms, making it difficult to identify. And malware doesn't exist for the sake of just existing; it has a purpose in mind that always involves taking something from...
The financial services industry thrives on safety and security - exactly what PINs and passwords are not. They're easily stolen, hacked and forgotten - making them a "double fail" to your customers and your organization. Luckily, there's a better way - biometric authentication, which leading banks are adopting to...
The dark web is notorious for dangerous content which dominates discussions in popular media. In order to understand the dark web beyond the myths and the industry hype, it is necessary to understand the content of the system as well as how the websites, users and activities on the dark web are connected to each...
The dark web has become a very effective resource for purchasing sinister educational materials. How-to guides are for sale on major dark web markets such as Hansa and AlphaBay and offer step-by-step instructions for drug trafficking, hacking, social engineering and many other cyber crimes.
Fraud guides, a subset...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
The upcoming enforcement of GDPR puts the spotlight on data governance, but what about the potential impact on vendor risk management? Jacob Olcott of BitSight discusses how to prepare for this new generation of cybersecurity regulations.
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
Microsoft Active Directory is a de-facto standard across organizations of all sizes for directory services which requires DNS to function. Many organizations configure their Active Directory with Microsoft DNS as it is embedded with Windows server. While some find it convenient to integrate this "in-the-box"...
Complying with an agency checklist is only the first step in a meaningful security initiative. Taking action and setting policy to manage risks and defend against cyber threats is considerable work.
DNS data is an extraordinary valuable - and surprisingly underutilized - source of information that gets to the heart...
Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Attackers are targeting users: deceiving them into visiting infected web pages, through cyber espionage, ransomware, and malicious attachments...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.