It's one thing to plan for a cybersecurity incident, but quite another to have proper insurance coverage to prepare for such an event. Mark Singer of Beazley shares an overview of the cyber insurance myths and realities.
Visa's move to no longer offer one-time passwords for smaller card-not-present transactions - up to INR 2000 - in India is drawing a mixed reaction. While proponents say the move will lead to wider use of digital payments, critics argue it will weaken security.
Facebook is suing NSO Group, a spyware company, alleging it developed a potent exploit to spy on WhatsApp messages sent by diplomats, journalists, human rights activists and political dissidents. Facebook is seeking damages and an injunction forbidding NSO Group from accessing its infrastructure.
What is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl". Enterprises are now awakening to this challenge and attempting to overcome it.
Download this eBook to learn more about:
How "tool sprawl" has created industry fatigue;
The resulting loss of visibility;
Big data analytics and search tools give organizations the ability to analyze information faster than ever before. But too many organizations deactivate security controls built into Elasticsearch, Amazon S3 buckets and MongoDB when they deploy, leaving their data exposed, says Elastic's James Spiteri.
Agile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks.
Now that the deadline for all e-commerce card-based transactions in the EU to comply with the new PSD2 "strong customer authentication" requirement has officially been extended to Dec. 31, 2020, authorities are emphasizing the need to make a smooth, uniform migration to the new forms of authentication.
Application-level visibility is a must-have to ensure service quality, end-user experience and performance as well as to reduce security risk.
Download the EMA report, "Understanding the Value of Application-Aware Network Operations" to learn more about the benefits of true application visibility needed for...
If 100 percent increase in NetFlow performance sounds good, get more impressive numbers in the new report from ESG. A 50 percent reduction in tooling costs? A 30 percent decrease in network downtime? It's all there and the numbers never lie.
Download and discover why Gigamon is critical for success.
Need to choose between security and performance?
Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of solutions as a centralized security tool farm. You can secure more data on faster networks without compromise between security, performance and...
ESG outlines how improving visibility across distributed computing environments doesn't equate with an increase in staff or tools. Read the ESG research brief and learn how visibility in a distributed network acts as the flash point that generates a host of benefits to operations teams. A common distributed data...
Zappos is close to settling a long-running class action lawsuit filed by consumers over a 2012 data breach. The online shoe and clothing retailer's proposed compensation would be a 10 percent discount on a future online purchase. A federal judge has granted preliminary approval to the deal.
Sodinokibi/REvil appears to be making millions since it seized the ransomware-as-a-service mantle from GandCrab earlier this year. Security firm McAfee says up to 40 percent of every victim's ransom payment - average: $4,000 - gets remitted to the Sodinokibi actor, with "affiliates" keeping the rest.
While the Russian-linked hacking group known as The Dukes, Cozy Bear and APT29 in recent years appeared to have gone somewhat quiet, researchers from ESET report that the hackers have been targeting various European embassies and ministries as part of what the security firm dubs "Operation Ghost."