With the explosion of remote business, we are
now digitizing many of our documents and
processes. Jay Schiavo of Entrust explains what
new mindset this shift requires and shares advice for
organizations currently making the shift.
Download this eBook to learn more about:
What’s needed to ensure document...
The changing threat landscape and the frequency, sophistication and targeted nature of adversaries require an evolution of security operational practices with a combination of prevention, detection and response of cyber attacks.
This report from Watchguard helps security teams understand the well-known cyber-attack...
Advanced threats are on the rise. Networks are inundated with phishing attacks, malware hides in encrypted traffic, and ransomware is an ever-present threat. Protecting your business requires a modern firewall able to deal with sophisticated threats, without adding complexity to your network.
In this eBook, we...
A home healthcare company says a data breach affecting more than 753,000 patients, employees and former workers stems from a ransomware attack on its private cloud hosted by managed service providers. The company reported a similar incident 15 months ago.
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
A major Australian broadcaster was hit over the weekend by what was likely ransomware, and the country's federal Parliament was affected by what is described as a clumsy incident that nonetheless triggered a shutdown of its email system.
Researchers at Awake Security says at least one attack launched by the operators of Hades ransomware has a connection to the China-linked Hafnium group waging attacks on vulnerable Exchange servers.
Leverage Gartner insights to fortify payment fraud prevention strategies. As businesses transform to meet shifting consumer behavior and emerging fraud patterns in digital channels, it’s never been more important to assess the comprehensive financial impact of fraud solutions.
Due to their unique ownership structure, for-profit law firms must balance targeted threats to their organization with a goal to minimize non-billable activity such as lengthy security procedures. This means cyber security can slip down the priority list until a breach occurs, exposing client data and sensitive market...
Several members of the German Parliament, the Bundestag, and political activists in the country were targeted by a spear-phishing campaign, according to a local news report Friday. Parliament previously sustained a cyberattack in 2015.
Eleven U.S. senators are raising concerns about the Department of Energy's cybersecurity readiness as the department continues to investigate a breach related to the SolarWinds supply chain attack.
Identity crimes are up, but data breaches are down. What does this mean for risk mitigation strategies? Jim Van Dyke and Al Pascual of Sontiq offer an analysis.
Over the last 12 months, federal prosecutors have charged 474 suspects with trying to steal more than $569 million through COVID-19-related fraud schemes, including attempts to swindle the Paycheck Protection Program for small businesses.
Left unsaid in Fat Face's "strictly private and confidential" data breach notification to affected customers this week was any indication that the fashion clothing retailer had paid a reported $2 million ransom to the Conti gang to unlock its systems. Fat Face has now confirmed the ransomware hit.
Microsoft says ransomware activity against compromised on-premises Exchange servers remains limited, but it warns that organizations are far from out of the woods.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.