Several tech giants, including Microsoft, Google, Cisco and VMware, have filed a brief backing Facebook's lawsuit against Israel-based spyware firm NSO Group, which has been accused of hacking into Facebook-owned WhatsApp's instant messaging app to enable spying by the company's clients.
Europol, the EU's law enforcement intelligence agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
For some, 'observability' is just a hollow rebranding of 'monitoring', for others it's monitoring on steroids. But what if we told you observability is the new way to find out why - not just if - your distributed system or application isn't working as expected? Today we see that traditional monitoring approaches can...
Intel and Cisco are among the thousands of SolarWinds Orion customers that were running a Trojanized version of the security software. FireEye, together with Microsoft and GoDaddy, have devised a "kill switch" to disrupt attackers' ability to access the malware on at least some infected systems.
In 2021, security information event management (SIEM) solutions will be far more than an information platform, expanding to include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics (UEBA) - now considered an essential capability by Gartner. On top of that,...
Christopher Krebs, who was recently fired by President Donald Trump from his role as director of the U.S. Cybersecurity and Infrastructure Security Agency, reiterated at a U.S. House committee hearing Wednesday that the November election was not tainted by cyberthreats.
An evolving workplace, greater reliance on IoT and the cloud, and already we have seen the new face of supply chain attacks. This is the backdrop for 2021, and Imperva's Brian Anderson offers insights into the cyber-attack outlook.
Point-of-sale device manufacturers Verifone and Ingenico have released fixes for flaws in some of their devices after researchers found the vulnerabilities could have enabled attackers to steal payment card data, clone cards or install malware.
The Zero Trust security model created by Forrester has become a mainstay of security approaches. But traditional Zero Trust controls largely overlook unmanaged and IoT devices, leaving the enterprise at risk.
Read this white paper and learn:
How existing Zero Trust security tools are not designed for unmanaged...
The use of the Internet of Things (IoT) devices has skyrocketed in our businesses, factories, and hospitals. The Mirai, Hajime, and Persirai botnets demonstrated how this explosive growth has created a new attack surface, already exploited by cybercriminals. Businesses must now address this new threat landscape to...
MITRE ATT&CK for ICS provides a framework for security managers to assess and improve their security controls for industrial control systems (ICS) and operational technology (OT) environments.
The Armis agentless device security platform is the fastest, most efficient way to find and stop cyber attacks in ICS and OT...
Hackers are targeting thousands of vulnerable MySQL servers around the world, using ransomware to exfiltrate data from organizations and then demanding payment, according to Guardicore Labs. The attackers are also selling access to over 250,000 stolen databases.
Watch this webinar with renowned cybersecurity innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner to lean about the biggest challenges facing security teams today.
2020 was the year of mass migration to multi-cloud environments, which paves the way for 2021 and a further explosion on microservices and severless cloud computing. Peter Klimek of Imperva discusses how cybercriminals are likely to respond - and how to anticipate them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.