Financial institutions face two major network security related challenges while working to serve their customers: the constant demand to improve in order to successfully compete in the market and regulatory compliance.
Yet, when it comes to security, the InfoSec team often uses slow, manual (and error prone)...
MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) has served as a model through which interested parties can learn to identify and map digital intrusions against their existing security technologies allowing them to shore up their gaps and prevent more intrusions on endpoints.
But what about the...
Continuously analyze suspicious traffic patterns and exposed services, anywhere in the world, with Expanse Behavior
In a time where networks evolve each day and include a diverse collection of Internet Assets such as IP addresses, domains, and certificates - how do you ensure that none of your Internet Assets...
Security teams cannot defend complex networks without holistic visibility and correlative insight into the environment. In review, SANS expert Matt Bromiley evaluates the Fidelis Elevate platform and its unique strengths surrounding network traffic analysis, threat detection and deception.
Download the paper now to...
In any network, accurate detection of threats, malware, command and control, and data leakage depends on accessing the content. This does not refer to the content of a packet, but rather the content of the entire network session because the content may be encapsulated or obfuscated under multiple layers of encoding,...
Since the EU's General Data Protection Regulation went into full effect in May 2018, European data protection authorities have received more than 160,900 data breach reports and imposed $126 million in fines under GDPR for a wide variety of infringements, not all involving data breaches.
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
British regulators have fined Dixons Carphone $653,000 for a breach that exposed millions of payment card details and personal data due to point-of-sale malware. The retailer's lack of security contributed to a "careless loss of data," the Information Commissioner's Office says.
Human error looks to be the obvious culprit in an accidental data breach by Britain's Cabinet Office, which published the home addresses of celebrities such as Elton John and Olivia Newton-John when it released a list of individuals set to be recognized for their contributions to British society.
While CCPA has drawn the biggest headlines when it comes to new U.S. privacy laws, businesses and consumers should also take notice of New York's SHIELD Act, which goes into effect in March 2020. The law is expected to have impact on Wall Street firms and other financial institutions headquartered in the state.
Seattle-based smart home device maker Wyze says an error by a developer exposed a database to the internet over a three-week period earlier this month. The data included customer emails, nicknames of online cameras, WiFi SSIDs, device information and Alexa tokens.
Wanted: A new chief executive to assume command of Britain's growing National Cyber Security Center, part of GCHQ. As Ciaran Martin departs, the successful NCSC model he helped create is being widely emulated in many countries. But the U.S. remains a notable holdout.
One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.