An in-depth look at the DMARC anti-spoofing system - which the U.S. Department of Homeland Security this past week said it will require federal agencies to adopt - leads the latest edition of the ISMG Security Report. Also, continuous monitoring of the insider threat.
Organizations must reimagine identity and access to adapt to the vanishing perimeter and the explosion of cloud-based applications and mobile devices. So how can you change your authentication strategy to ensure your business does not become one of the four out of five data breaches which involve weak, default or...
Enterprise intelligence combines human-led analysis and computer-driven analytics to provide actionable insights for your enterprise, so you can disrupt and neutralize threats.
Download this infographic and learn:
How often insider misuse is responsible for security incidents;
The average cost of a single data...
Organisations of every size are experiencing a problem as their operations digitally transform. They are unable to secure mission-critical workloads on cloud-based infrastructure without increasing risk, operational friction, or introducing compliance violations.
However, creating simpler and faster user-based...
Intelligence agencies, governments, military and defense agencies, law enforcement, and commercial enterprises worldwide need to utilize a proactive, intelligence-driven offense to prevent and disrupt today's sophisticated threats.
Cyber threats vary greatly, and so do the methods of attack. To counter various...
Metro Bank is the UK's first new High Street bank in over 100 years. With a focus on the customer, Metro Bank provides unparalleled levels of service and convenience to its customers.
Metro Bank wanted to take employee productivity to the next level by enabling off-network access to Office 365 and Yammer, but found...
Sweden has ended a seven-year rape investigation against WikiLeaks founder Julian Assange. But it's far from the end of the legal troubles for the man whose spilling of secrets has shaped world politics.
Here are five cyber-related takeaways from FBI Director James Comey's testimony before the Senate Judiciary Committee, including his rationale on notifying Congress of his decision to reopen the probe of Hillary Clinton's use of a private email server and steps the bureau is taking to defend against the insider threat.
Federal agencies increasingly view open hybrid cloud platforms as effective tools to modernize IT and adopt agile development approaches.
Download this executive brief and learn how open hybrid cloud solutions allow federal agencies to:
Seamlessly integrate modern IT capabilities with existing...
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
The latest edition of the ISMG Security Report leads off with an interview with the co-editor of a new book, Inside Threat, who uses examples from the physical world that can be applied to the virtual world. Also, organizations fall short on offering identity protection services.
High-pressure. Fast-paced. Threats coming from all directions. The battle against payment fraud isn't unlike the game of basketball. Wire fraud and ACH fraud are on the rise, and financial institutions cannot be slow on the defense - to win, they must detect fraud in real-time.
Banking channels through which...
Leading the latest edition of the ISMG Security: A deep dive into the WikiLeaks release of thousands of documents that appear to lay open in detail the CIA's computer hacking techniques Report. Also, tackling the rise of attacks targeting the internet of things.
Federal prosecutors have filed criminal charges against 16 individuals who were allegedly part of a $60 million healthcare fraud case involving falsifying electronic health records of hospice patients. Do EHRs make it easier to commit - and investigate - healthcare fraud?