Kaspersky Lab says it "inadvertently" scooped up classified U.S. documents and code from an NSA analyst's home computer, but suggests it wasn't the conduit by which the material ended up in Russian hands. It claims that the computer was riddled with malware.
Clearly, adherence to HIPPA, NIST and other regulators in healthcare is paramount, but that does not mean that your organization isn't vulnerable to cybercrime hacking. When the average breach is worth $3.62 million with $380 per patient record compromised (as per Ponemon's 2017 Cost of
a Data Breach Report), the...
During the past year alone, we've witnessed a number of devastating cyber attacks, from the massive Equifax breach to the seemingly never-ending Yahoo! breach.
Though "black hat hackers" are responsible for each of these attacks, these individuals represent a small segment of a much larger community. White hat...
The U.S. Justice Department has identified at least six members of the Russian government that investigators believe orchestrated last year's hack of Democratic National Committee computers and dumping of stolen information and may file charges next year, the Wall Street Journal reports.
Former Trump campaign aide George Papadopoulos learned that Russia had thousands of pilfered emails containing "dirt" on Hillary Clinton three months before they appeared online, according to court documents.
Security officials at Britain's biggest airport have been left scrambling after a USB stick that reportedly contained sensitive information was found on a London street. Heathrow Airport says it has launched an investigation and is working with London's Metropolitan Police.
Cyber threat hunting is a human-led process that enriches your existing security measures with contextual insights gained from external and internal data sources.
Download this infographic and learn how cyber threat hunting turns:
Human investigations into analysis;
Data computation into analytics;
Anti-virus vendor Kaspersky Lab says that an internal probe has confirmed that in 2014 a PC running its anti-virus software flagged and submitted new Equation Group APT malware variants. But after an analyst realized the provenance of the source code, the firm says its CEO ordered that it be immediately deleted.
In today's dynamic threat landscape, "real-time" is the operative phrase - and it needs to apply both to threat detection and incident response. But what are the required security controls and tools?
Download this eBook on real-time capabilities and learn:
What's at risk for organizations that lack these tools and...
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It's the age of open banking, and that means changes for banking institutions and their customers - as well as for fraudsters. Just as open banking era makes business easier for customers, it also enables new opportunities for cybercriminals.
Download this eBook interview transcript and learn about:
Key gaps in how healthcare entities defend against cybercrime hacking have emerged. Even organizations strictly adherent to HIPAA, NIST or other regulators are still unaware of how their practices compare to their industry peers and whether or not they are lagging behind.
Has your organization assessed and mitigated...
Organizations today are making the same security mistakes with APIs that they made with their websites 10 years ago. Common mistakes such as unnecessary bloat of API responses, making too many round trips for content and ignoring some of the low-hanging protocol fruit are negatively impacting both security and...
Assessing and assigning trust in endpoints is a big challenge enterprises face as they move to the cloud. However, a strategy exists which can protect apps and data across many endpoint scenarios, allowing IT to maintain balance between access and risk.
Download this whitepaper and learn how to:
A hacker exploited an unpatched, 12-month-old flaw in a small Australian defense contractor's IT help desk and stole data for the country's F-35 Joint Strike Fighter program, among other secrets, the Australian government has warned.