Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, BitSight Technologies really is not seeing a decrease in the number of reported incidents.
Download this whitepaper that discusses:
The high rate of breaches reported by large...
Larger hospitals, especially teaching institutions, appear to be at greatest risk for health data breaches, says a new study. But what are the major contributing factors?
When it comes to the motivations driving Eastern European cybercriminals, "pseudo-anti-Americanism" is big, says Vitali Kremez, a researcher with intelligence firm Flashpoint who regularly infiltrates cybercrime forums.
DDoS attacks are complex and unpredictable, making human intervention and expertise essential to mitigation. In Q4 2016, one internet security organization observed an 167% increase in the average DDoS attack peak size from 2015. While deploying attack mitigations, they also observed that 52% of attacks were User...
DDoS attacks against financial institutions can reduce productivity and decrease revenue. In Q4 2016, one internet security organization observed that 7% of all their mitigations were for the finance industry. The attacks they fought against averaged a size of 10.4 Gbps and peaked over 100 Gbps.
Download this...
Cyber threats are constantly evolving, and federal government agencies must operate under the assumption that a motivated adversary can and will infiltrate their network environments. A security intelligence and analytics platform can simplify an agency's approach to cybersecurity by unifying and analyzing disjointed...
A Texas-based pediatric practice is the latest healthcare entity to report a major data breach following a recent ransomware attack, despite the organization's efforts to mitigate the incident quickly.
Federal regulators are warning healthcare sector organizations about the threat of man-in-the-middle attacks and related risks associated with the use of some Secure Hypertext Transport Protocol, or HTTPS interception products for end-to-end security.
During 2015, federal departments collectively reported 77,183 cybersecurity incidents, a 10 percent increase from 2014. Looking ahead, cyberrisks and attacks are rapidly increasing and evolving. In short, more clearly than ever, cybersecurity is everyone's priority. However there is a silver lining: government is...
A North Korean IP address has turned up in an investigation by Kaspersky Lab into attacks against banks' SWIFT systems. The finding is a strong indication that the Lazarus hacking group may be run by North Korea.
DDoS attacks can cripple your network, reduce productivity and decrease revenue. This quarterly report provides a unique view into attack trends and behavioral data derived from attack mitigations .
Download the new DDoS Trends Report to stay up-to-date with recent industry data such as:
167% increase in attack...
Leading the latest edition of the ISMG Security Report: A breakdown of testimony presented at a Senate Select Committee on Intelligence hearing on Russia's attempt to influence the U.S. presidential election. Also, remembering Trend Micro Chief Technology Officer Raimund Genes.
More than 60,000 servers running Microsoft's out-of-support IIS 6.0 server software may be vulnerable to a newly revealed zero-day exploit. No patch will be produced, but a workaround can blunt an attack.
Malware attacks are increasing, including ransomware like CryptoLocker, Locky, and zCrypt.
Businesses know it's essential to protect PCs from malicious programs, but many don't realize the value of server-level protection until the damage is done. Server-level protection from viruses and malware is essential, and...
Give the right users access to the right resources at the right times and for the right purposes.
Two-thirds of businesses have experienced data theft or corruption that originated within their organizations. But insider threats are difficult to control because your IBM i users need at least some level of access to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.