This quarter's finds uncover some very interesting cyber security trends and examples of malware developers, leveraging agile development, IoT devices used for cryptojacking, and vulnerability exploitation.
Learn more about the threat intelligence behind this report and how you can prevent cyberattacks in your...
Three months after the EU's General Data Protection Regulation went into full effect, the U.K.'s data privacy watchdog says that the number of data protection complaints it has received from individuals has nearly doubled.
Cloud services are a pillar of a digital transformation,
but they have also become a thorn in the side of
security architects. As data and applications that were
once behind the enterprise firewall began roaming
free-on smartphones, between Internet-of-Things
(IoT) devices, and in the cloud-the threat...
We're in an era of fastpaced
digital transformation that broadens the attack surface, increases workloads, and pushes the
complexity of security management to new heights. All while, the threat landscape is becoming
increasingly more difficult to defend against. While operational teams in the Network Operations...
Unprotected web-based applications are often the easiest point of entry for hackers and
are vulnerable to a number of attack techniques. Traditional technologies, including firewalls
and intrusion prevention systems (IPS), cannot provide complete protection from these
threats. Web application firewalls (WAFs) have...
One of the biggest challenges in stopping data breaches lies in sifting through vast amounts of data to find the proverbial "needle in the haystack" - the subtle clues that indicate an attack is imminent or underway in your organization. As modern computer systems generate billions of events daily, the amount of data...
Cybercrime is a business and, like any business, it's driven by profit. But how can organizations make credential theft less profitable at every stage of the criminal value chain, and, in doing so, lower their risk?
Cyber statistics in 2016 paint a bleak picture. Unpatched vulnerabilities proliferate. Attackers weaponize new exploits 3x faster than just a few years back.
The attack surface continues to expand as shadow IT abounds, and non-traditional platforms, like cloud/virtual, mobile, and IoT, are becoming pervasive....
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with...
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union needed to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a...
Digital technology is touching every aspect of our lives, which is giving bad actors unlimited runway to create new threats daily. It's this atmosphere that makes it imperative that organizations are prepared, informed and actively hunting for adversaries.
While the modern enterprise embraces digital technology, it...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.