Most companies have huge gaps in their cyber security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: "Assume Breach".
Join Roger A. Grimes, a 30-year computer security consultant, for this webinar where he explores the latest research on what's wrong with current...
In a case of business email compromise, Chinese hackers stole $18.6 million from the Indian arm of Tecnimont SpA, an Italian engineering company, through an elaborate cyber fraud scheme that included impersonating the firm's chief executive.
Phishing attacks have seen a meteoric rise in the last year as attackers continue to refine their tactics and share successful attack types. In particular, they've taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks.
Download this white...
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, as...
Don't fear free tools and practices if they can help your organization better block phishing attacks, improve information security posture and help safeguard others, too, says Andy Bates of the Global Cyber Alliance.
The U.K.'s National Cyber Security Center incident response teams have investigated more than 1,000 significant incidents in the past two years, the majority of which trace to nation-state attackers, officials say.
Email fraud threats have evolved from attackers targeting networks to them focusing on specific individuals within an organization. What can enterprises do to halt these attacks before they reach the inbox? Denis Ryan of Proofpoint shares defensive tactics.
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
As healthcare records have steadily gone digital, the industry
has had to play catch-up with cybersecurity. But that is starting
to change as healthcare companies pay a steep toll in data
breaches: records replacement, remediation, downtime, bad
reputation, fines and even stock prices. The damage happens
This white paper discusses the optimal method of enabling security for Office 365 so as to maximize protection against the growing array of security threats that organizations will encounter, while minimizing the total cost of ownership.
Download and read this white paper and you will learn:
How moving to the...
Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery.
Download this white paper and learn:
Why the risks of relying solely on Office 365 are...
Advanced attacks such as business email compromise and account takeover-based attacks continue to be a leading way attackers are bypassing Secure Email Gateways (Exchange Online Protection included). Unfortunately, the majority of such attacks target Office 365 organizations.
To stop these attacks a new model...
The 2018 State of the Phish Report presents analysis of data that can help CISO's and their teams identify opportunities to manage end-user risk. The report delivers the types of data infosec professionals are seeking as they develop their own security awareness training programs.
Download this report to learn more...
Spear phishing attacks are in the news again following the Justice Department's indictment of Russian military intelligence officers for alleged attacks against U.S. politicians and county and state election boards. Here's how to play better phishing defense.
This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.