As the risks to IT and OT converge, organizations must use "zero trust" to verify user identities and build effective monitoring capabilities to track the behavior of privileged users, say Kartik Shahani of Tenable and Rohan Vaidya of CyberArk.
A Nigeria-based ransomware gang is conducting a campaign that dangles a $1 million bribe - or a portion of any ransom collected - to employees of targeted organizations if they will install DemonWare ransomware on their corporate network.
The Australian Cyber Security Centre (ACSC) responded to 2,266 cyber security incidents at a rate of almost six per day from July 2019 to June 2020. These attacks not only disrupt the businesses but translate to costing the economy up to $29 billion per year which is 1.9% of Australia’s gross domestic product (GDP)....
Global research uncovers IT security leaders’ key strategies for cloud complexity, remote work and supply chain attacks.
Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks. Our...
A 30-year-old Greek national has been indicted on charges of selling insider trading tips and other proprietary financial data on darknet sites. Apostolos "The Bull" Trovias faces securities fraud and money laundering charges.
To crack down on insider fraud, organizations should consider using artificial intelligence, machine learning, data analytics, data visualization software, predictive modelling and social network analysis, says Roger Darvall-Stevens, a fraud and forensic services expert at the consultancy RSM Australia.
The Justice Department has filed seven new criminal charges against Paige Thompson, who is suspected of hacking Capital One in 2019, compromising the data of 100 million Americans, including exposing hundreds of thousands of Social Security numbers. If convicted, She now faces a possible 20-year sentence.
This edition of the ISMG Security Report features an analysis of CISA's finding that agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by properly configuring firewalls. Also featured: Congressman discusses deterring nation-state attacks; insider threat mitigation tips.
Cybercriminals and nation-states are attempting to recruit insiders at companies around the world to help steal credentials and intellectual property, says Joseph Blankenship, vice president and research director at Forrester, who offers risk mitigation insights.
Securing identities in a “zero trust” environment requires applying multifactor authentication and then adding layers – and artificial intelligence can play a critical role, says Neha Monga, Microsoft’s director of product marketing for cybersecurity and data governance - APAC.
Download this eBook, where...
In a decision that will have major implications for the cybersecurity industry, the U.S. Supreme Court ruled Thursday to limit the scope of the Computer Fraud and Abuse Act. Security researchers and civil liberty groups argued that the 1986 law was too broadly written and outdated for today.
In a recent research project on cyber risk management, 340 cybersecurity and IT professionals were surveyed. They were asked what their organization’s biggest vulnerability management challenge is. 42% of respondents indicated that their biggest vulnerability management challenge is tracking vulnerability and patch...